COMP 3000 Essay 2 2010: Difference between revisions
Created page with "==Directions== You are to write a document that explains the key ideas of your assigned paper. Your articles should have the following format: *'''Paper''': the paper's title,…" |
|||
Line 10: | Line 10: | ||
==Papers== | ==Papers== | ||
#[[COMP 3000 Essay 2 2010 Question 1|An Analysis of Linux Scalability to Many Cores]] | |||
#[[COMP 3000 Essay 2 2010 Question 1|Trust and Protection in the Illinois Browser Operating System]] | |||
#[[COMP 3000 Essay 2 2010 Question 1|FlexSC: Flexible System Call Scheduling with Exception-Less System Calls]] | |||
#[[COMP 3000 Essay 2 2010 Question 1|Accountable Virtual Machines]] | |||
#[[COMP 3000 Essay 2 2010 Question 1|Bypassing Races in Live Applications with Execution Filters]] | |||
#[[COMP 3000 Essay 2 2010 Question 1|Effective Data-Race Detection for the Kernel]] | |||
#[[COMP 3000 Essay 2 2010 Question 1|Ad Hoc Synchronization Considered Harmful]] | |||
#[[COMP 3000 Essay 2 2010 Question 1|TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones]] | |||
#[[COMP 3000 Essay 2 2010 Question 1|The Turtles Project: Design and Implementation of Nested Virtualization]] | |||
#[[COMP 3000 Essay 2 2010 Question 1|mClock: Handling Throughput Variability for Hypervisor IO Scheduling]] | |||
#[[COMP 3000 Essay 2 2010 Question 1|Virtualize Everything but Time]] |
Revision as of 06:20, 11 November 2010
Directions
You are to write a document that explains the key ideas of your assigned paper. Your articles should have the following format:
- Paper: the paper's title, authors, and their affiliations. Include a link to the paper and any particularly helpful supplementary information.
- Background Concepts:
- Research problem:
- Contribution:
- Critique:
Papers
- An Analysis of Linux Scalability to Many Cores
- Trust and Protection in the Illinois Browser Operating System
- FlexSC: Flexible System Call Scheduling with Exception-Less System Calls
- Accountable Virtual Machines
- Bypassing Races in Live Applications with Execution Filters
- Effective Data-Race Detection for the Kernel
- Ad Hoc Synchronization Considered Harmful
- TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
- The Turtles Project: Design and Implementation of Nested Virtualization
- mClock: Handling Throughput Variability for Hypervisor IO Scheduling
- Virtualize Everything but Time