Showing 1 - 20 results of 27 for search '"FreeBSD"', query time: 0.22s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Módulo de recuperación de fallos de los procesos de un sistema FreeBSD utilizando variables en disco by Javier Vargas, David Guevara, Franklin Mayorga, Ernesto Jiménez

    Published 2017-11-01
    “… ABSTRACT This paper describes the creation of a crash-recovery module of the processes in a reliable communication program with fall and recovery of equipment, on a FreeBSD system. The creation of this module is based on the parameters or values that a running process contains, establishing a variable or file that is stored on disk. …”
    Get full text
    Article
  9. 9
  10. 10

    ANALISIS PERBANDINGAN VOIP SERVER ANTARA BRIKER IPPBX DENGAN ASTERISK by , Setiya Nugroho, , Dr. Ir. Sasongko Pramono H., DEA.

    Published 2011
    “…Asterisk VoIP server installed on FreeBSD has the QoS and MOS values are better than Briker VoIP server.…”
    Thesis
  11. 11

    NCT: pacote de tratamento de coordenadas normais (versão 7) NCT: normal coordinate treatment package (version 7) by Yoshiyuki Hase

    Published 2004-08-01
    “…Program codes were almost wholly rewritten to be more efficient with GNU Fortran77, or g77, and compiled under FreeBSD and MS-DOS with the DJGPP implementation. …”
    Get full text
    Article
  12. 12

    AMINIMALISIR PING TIME WITH TRAFFIC SHAPER HFSC & TS LIMITER OPERATING SYSTEM USING PFSENSE IN WARNET BINTANGNET by Dedi Irawan

    Published 2017-03-01
    “…Pfsense sebuah  OS  berbasis  linux  turunan  FreeBSD  yang  biasa  di  gunakan  untuk firewalldanrouter padasebuah jaringan. …”
    Get full text
    Article
  13. 13

    Mining Change Logs and Release Notes to Understand Software Maintenance and Evolution by Liguo Yu

    Published 2009-08-01
    “…This approach is applied in the study of the change logs of Linux and the release notes of FreeBSD. The results show that the software maintenance process and evolution process share some common properties and the keyword-based text mining technique could be used as a systematic method to study software maintenance and evolution.…”
    Get full text
    Article
  14. 14

    LipidWrapper: an algorithm for generating large-scale membrane models of arbitrary geometry. by Jacob D Durrant, Rommie E Amaro

    Published 2014-07-01
    “…A copy of the program can be downloaded free of charge under the terms of the open-source FreeBSD License from http://nbcr.ucsd.edu/lipidwrapper. …”
    Get full text
    Article
  15. 15

    Attack and vulnerability penetration testing: freebsd by Stiawan, Deris, Idris, Mohd. Yazid, Abdullah, Abdul Hanan

    Published 2013
    “…This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. …”
    Get full text
    Article
  16. 16

    UF2C — User-Friendly Functional Connectivity: A neuroimaging toolbox for fMRI processing and analyses by Brunno Machado de Campos, PhD, Raphael Fernandes Casseb, PhD, Fernando Cendes, MD, PhD

    Published 2020-01-01
    “…UF2C is implemented in Matlab language and falls within the FreeBSD license. Our toolbox builds on a combination of existing methods to increase the user’s power to perform different types of resting-state functional connectivity, event-related, and task activation analyses. …”
    Get full text
    Article
  17. 17

    Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits by Christopher Kugler, Tilo Müller

    Published 2015-10-01
    “…Focusing on Linux and FreeBSD running on the AMD64 architecture, we show compatibility, security and performance results. …”
    Get full text
    Article
  18. 18

    Modular verification of preemptive OS kernels by Gotsman, A, Yang, H

    Published 2011
    “…This interdependency is even stronger in mainstream kernels, such as Linux, FreeBSD or XNU, where the scheduler and processes interact in complex ways.…”
    Conference item
  19. 19

    Detecting Memory Life-Cycle Bugs With Extended Define-Use Chain Analysis by Gen Zhang

    Published 2020-01-01
    “…Moreover, experiment result of analyzing the latest mainline OS kernels with MLCSan is a strong proof that MLCSan is effective in detecting MLC bugs and can scale to different platforms, in which 41 new bugs are identified in Linux and FreeBSD. And undoubtedly, we will open source MLCSan prototype to contribute to the security research in this area.…”
    Get full text
    Article
  20. 20

    Network Traffic Anomaly Detection via Deep Learning by Konstantina Fotiadou, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou, Theodore Zahariadis

    Published 2021-05-01
    “…In this work, we propose novel Deep Learning formulations for detecting threats and alerts on network logs that were acquired by pfSense, an open-source software that acts as firewall on FreeBSD operating system. pfSense integrates several powerful security services such as firewall, URL filtering, and virtual private networking among others. …”
    Get full text
    Article