Modern Trends Used In Operating Systems For High Speed Computing Applications
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Operating system researches traditionally consist of adding new functions to the operating system in other words inventing and evaluating new methods for performing functions. Operating systems are the single most complex piece of oftware in a computer system, which contains hundreds of thousands, if not millions, of lines of code. Today’s operating system research is directed at finding new ways to structure the operating system in order to increase its flexibility, allowing it to adapt to changes in the application set it must support. This paper presents a comprehensive survey report about its quirements and evolutions of emerging operating system for modern echnology based next generation.
Authors and Affiliations
Qurat-ul-Ain Malik, , M. Aqeel Iqbal , Nauman Khan , Hamza Khan , Haider Ali
Cloud Computing: Securing Client Data Storage
Within cloud computing environment, vibrant useful resource part and reallocation tend to be important, helpful and ultimately promote capital investment returns. This paper covers method inside situation associated with...
Robust Watermarking Scheme using Column DCT Wavelet Transform under Various Attacks
A novel watermarking scheme for color images has been proposed using column DCT wavelet transform. To improve the robustness of watermarking scheme, compressed watermark with tolerable fidelity is embedded into host imag...
A Cascaded Incoherent Spectrum Sliced Transversal Photonic Microwave Filters-An Analysis
An analysis of the performance of a simple, incoherent spectrum sliced microwave photonic filter is presented. This filter structure is based on cascading of two incoherent fiber Fabry -Pérot filters as a slicing element...
A Effective and Complete Preprocessing for Web Usage Mining
Now, peoples are interested in analyzing log files which can offer valuable insight into web site usage. The log files hows actual usage of web site under all circumstances and don’t need to conduct external experimenta...
Cryptography for Resource Constrained Devices: A Survey
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight c...