A Bibliography of Publications in Byte Magazine: 1995–1998

Total Page:16

File Type:pdf, Size:1020Kb

A Bibliography of Publications in Byte Magazine: 1995–1998 A Bibliography of Publications in Byte Magazine: 1995{1998 Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 30 December 2016 Version 2.29 Title word cross-reference [Ano95a]. 120-MHz [Ano95-158, LM95b]. 1200-dpi [Ano95-118]. 12000e [Law95]. 12X [Emi97]. 133 [Ano95c, Ano95-205, LM95b]. 133-MHz 000-rpm [Mia97c]. 02 [Row97]. [Ano95c, Ano95-205, LM95b]. 14 [Ano97-41]. 14.4 [FH97, Smi95a]. 14.4-Kbps [FH97]. 1 [Ano95-55, Ano95-198, Dej95e, Gas95, 14.4-Kpbs [Smi95a]. 15GA Lo97, Mul96a, Way97f]. 1-2-3 [Ano95-204, Ano95-209]. 16-bit [Ano95-93]. [Cra96, Ano95-55, Dej95e, Gas95]. 16-to [Ano95-188]. 17- 1-800-Internet [Mul96a]. 1-Gb [Lo97]. 1.2 [Ano95-106, HKM96]. 17-inch [Ano95-106]. [Ano98-59]. 10-PPM [Ano95-101]. 17GA [Ano95-204, Ano95-209]. 10.4-inch [Joc95e]. 100 [Ano98a, Bal95g, Cun95]. 100-Mbps 2 [Ano95-111, Ano95-112, Ano96-74, [Cun95]. 100-MHz Ano98-55, Gas95, Gio95, KE97, Nan95a, [Ano95-208, Ano98a, Bal95g]. 10ppm Nan96g, Tam95a, Wes96b, Wes96a]. 2.0 [Ano95-101]. 11- [Ano95-101]. 11-to [MC98]. 20- [Ano95-106]. 20-and [Ano95-101]. 120 [Ano95-106]. 200 [Ano96-178, RV96]. 200- [Ano95a, Ano95-158, Ano96-174, LM95b]. [Van97]. 200-MHz [Ano96-178, RV96]. 120- [Ano95c]. 120-and [LM95b]. 120-MB 1 2 2000 [Ano98s, Ano98-95, Em98]. 202 3Dlabs [MD95]. 3XP [Tam95d]. [Hum97a]. 209 [Ano97z]. 20ppm [Ano95-188]. 21-inch [Ano95-106]. 225 4 [Ano97-97]. 4-D [Ano97-97]. 4-mm [Van97]. 225-MHz [Van97]. 233 [Yag98a]. [Ano95-100]. 4-pound [Way97g]. 4.0 233-MHz [Yag98a]. 24-bit [Van95a]. [Bla96, Gil96b]. 4.O [Nan95d]. 4.x 24-ppm [HKM96]. 250P [And95a, And95b]. [Ano95-63]. 400 [Ano97c, Ano98-83]. 28.8-Kbps [KH95]. 28A [Ano96-132]. 400-MHz [Ano97c]. 4000 28A-B [Ano96-132]. 2A [Ano96-132]. 2A-B [Ano98-126, Hum96i]. 4100Z [Van96c]. [Ano96-132]. 2GB [Hum96e]. 440LX [Cam98a]. 486-style [Ano95-159]. 486DX4 [Ano95-104]. 4s [Ano95t]. 3 [Ano95e, Ano95f, Ano95-60, Ano95-55, Ano95g, Ano96-48, Ano96-126, Ano96-173, 5 [Ano97-113, Ano98-68, Ano98-115, Gil97a]. Ano97-110, Ano97-119, Bal95b, Bou95, 5-pound [Ano98-96, Row96c]. 5.0 [MC98]. Dej95e, Dej95c, Dej95b, Die95a, EP97, 500 [Ano96-161]. 500-MHz [Ano96-161]. Flo96a, Fou95a, Fou95b, Gas95, Gre97l, 5100 [Ano98-85]. 5300c [Ano95-203]. 533 Hal96f, Hal97c, HKM97a, Hum96b, Hum97a, [Hal96h]. 533-MHz [Hal96h]. 540c Joh96, Lov95, MD95, Row96a, Row97, [Ano95-104]. 56 [Ano96-45, Ude95d]. Sup97, Tho96a, Tho96r, Yar95]. 3-D 56-Kbps [Ano96-45, Ude95d]. 5K86 [Ano95e, Ano95f, Ano95-60, Ano95g, [Ano96-170]. 5K86-P75 [Ano96-170]. 5p Ano96-48, Ano96-126, Ano96-173, Ano97-110, [Ano97-114]. Ano97-119, Bal95b, Bou95, Dej95c, Dej95b, Die95a, EP97, Flo96a, Fou95a, Fou95b, 6- [Ano95-101]. 6-based [Ano97-82]. 6-to Gre97l, Hal96f, Hal97c, HKM97a, Hum96b, [Ano95-101]. 6.0 [Gil98a]. 600 Hum97a, Joh96, Lov95, MD95, Row96a, [Ano97e, Ano98-51]. 600-dpi [Hum96i]. Row97, Tho96a, Tho96r, Yar95]. 3-pound 600-MHz [Ano97e]. 6000 [Ano95-186]. [Ano98-96]. 3.0 [Ano97-114]. 3.5-inch 603e [Tho95k]. 6200 [Chi96b]. 6200MX [Ano95h]. 3.x [Hum97c]. 64 [Ano95-63, Ano95-125, Goo95a]. 30-ppm [Ano95-151, Ano95-152, Ano95-192, Hal98d]. [Ano95-101, Ano95-101]. 300 [Ano95-198, 64-bit [Ano95-151, Ano95-152, Ano95-159, Ano97b, Ano97-106, Cam98a, Hal96g]. Ano95-192, Ano97-54, Lac96, Sim96, 300-MHz Ano95-151, Ano95-152, Ano95-192]. 64-hit [Ano97b, Ano97-106, Cam98a, Hal96g]. [Ano97t]. 66 [Ano95-104]. 66-MHz 300-to-1 [Ano95-198]. 32 [Ano95b, LM95b]. [Ano95-104]. 660Plus [Ano97-120]. 680x0 32-bit [Tho95h]. 6bone [Fin98]. 6X [Ano95-159, Ano95-157, Api95c, CCS97, [Ano95i, Ano95j]. 6x86 Chi96a, Cra96, Moh97b, Tam95a, LM95b]. [Ano96-37, Ano96-38]. 32-bitness [Mia95d]. 32-Mb [Ano95b]. 32-ppm [Ano95-189]. 33 [Tho95g]. 7 [Ano96-172]. 7000S [Ano98h]. 701C 33-MHz [Tho95g]. 333 [Tan98]. 333-MHz [Joc95e]. 755CV [DeJ95a]. 765 [Ano98-76]. [Tan98]. 350 [Ano97-118]. 36A [Ano96-133]. 36A-D [Ano96-133]. 386DX4 [Ano95-104]. 8 [Ano97-27]. 8-mm [Ano95-100]. 8000 386DX4-based [Ano95-104]. 3A [Pou95d]. 810N [Ano95-104]. [Ano96-178]. 3D [Ano96-173, Ano97-77, Em98, Flo96a]. 95 [Ano97-125, Gre96j, Pou97j, Pou98f, 3 VN97a, Won98b]. 95-based [LM95b]. active-matrix [Ano95-104, Van95a]. 95/Memphis [Ano97-125]. 95/Office ActiveX [CL97]. Actual [Ano98c]. [SK96a]. 950N [Ano95-204, Ano95-209]. actually [Ano95-154, Pra95b]. Ada 9580A [Ano95-211]. '97 [Gil96g]. '98 [MH97b]. adapter [Smi95b]. Adapters [Ano98-75, Ano98-83, Gar98]. [Ano95-107, Ano96k]. adaptive [Laz97a]. Add [Ano96z, Ano98-28, Ano95-95, Gre96g]. = [Ano95-159, Pri95, Way96m]. add-on [Ano95-95]. Adding [Fen95, Tho95c, Tho95d, Ano95-134, A-B [Ano96-133]. AAAS [Pou95q]. Ano95-135, Pou98c]. additional [Nan95c]. abilities [Way95a]. ability Additions [Sta96d, Fri98a]. Address [Ano95-59, Cro95, Goo95b]. able [Sch96h, Way96f, Bri97a, Die95c, Win95, [Gar97, Wat97b]. Abstract Sch96g]. Addresses [Win95, Sup97]. [Tho95i, Tho95j]. Abstraction Addressing [Fri97e, Ano95-116, Ude95d]. [Tho95j, Nan95g]. accelerate [Ano95-48]. Adds [Ano96-95, Ano95-184, Ano97-114, Accelerated [Ano96-48]. Accelerator Ano98-93, Bal96d, Dej95e, Mia95c]. Adieu [Ano96-173]. Accelerators [Pou96h]. Adjustable [Sta97a]. [Ano95-107, Ano98-115, Hum96b, Hum97a]. Administration [Hur97a]. admits Accent [Ano98-113]. Acces [Ano98-63]. [Ano95w]. Adobe [Ano97-114, Ano97-116, Access Bla96, Hum96g, Kay96a, Sha96]. Adoption [Ano95x, Ano98-37, Bri97a, Cam98b, Dob97c, [Hal98f, Way95e]. ADSL [Cam98b]. Gre97h, KHM+96, Lev98, Lew96, Sal95e, advanced [Cha97, Gas95]. Advances Sal95f, Smi95d, Smi95c, Ano95-27, Ano95-72, [Abr97b, Abr97a, Abr97c, Ano95k, Ano97f, Ano95-136, Ano98m, Bal95e, Dob98a, Eng97, Dob95, Ano95-48]. Advantages [LM95b]. Cot95b, Het96d, Hum98a, MC97, Nan95c, Adventure [Ano95-163, Mon95a, Pou95t]. Sal95k, Vog95, Way96m, Yag97b, Ano95k, Adventures Ano95-64, Ano95-133, Dob95, Dob96]. [Mon96a, Pou95t, Ude96c, Bal96c, Hal95b]. access-routed [Sal95k]. accessibility Advertisers [Ano95-86, Ano95-87, Ano96d, [Ano95-136]. accomplish Ano96-79, Ano96-80, Ano96-81, Ano96-82, [Fri95a, Joh96, Laz96]. According Ano98-53, Ano98-54]. Advice [Knu96c, [ATA96, Pou97g]. accounting [Ano95-77]. Sal95m, Kay97a, Key95, Pou95k, Pou96i]. accuracy [Ano95-204, Ano95-209, Hil95]. Aerial [Ano96c]. afar [Won98b]. Affair accurate [Cua95b, Dej95g, Sug95]. [Hur97e]. affect [Key95]. Affordable Achievement [Ano95-79, Ano95-100]. [Hal96f, Hum96b, Tho98a, Hal96h, Nad95b, Achievements Wei95]. After [BEM95, Pou97f, Pri95]. AG [Ano95-106, Ano95-104, Ano95-103]. [Lin95d]. Again [Ano96-86, Ano98-59, Achilles [Ano95-194]. Acorn [Pal96]. MB97, Ude97h, Lin95a]. Against Acquire [Ano95-101]. acquires [Ano95-100, GM95a, Hal98a, Lin95d]. Age [Ano95-133]. acquisition [Dej95h]. acres [Gre97k, Hal96k, Pou97h, Ano97-124, [Pal96]. Acrobat [Ano97-114]. across Gre96h]. agency [Cla95a]. agent [Cot95c, Fri97a, Ren98, Sin95a, Won98c, [Ano95-116, Way95b, Way95a]. Yag97a]. Act [Ano96-178]. Action Agent-Enhanced [Way95a]. Agents [Ano95e, Ano95f, Bal95b]. Actions [Ano95l, Ano95-92, Hal96a, Way95b, Ind95, [Ano98b]. Activator [Gre97q]. active Wat95, Way95f]. agnostic [Ano98-84]. ago [Ano95-104, Van95a, Gre97q]. [MB97]. AGP [Ano97-77]. agree [Hum96c]. 4 agreements [Ano95-222]. Ahead [Ano95m, analytical [Het97, Pen98]. analyzer Ano96-183, Ano97-79, Nan95d, Het96b]. [Ano95-55, Abr97b]. Analyzers [Ano98-78]. ahout [Ano96-134]. AI [UT95]. Aiding analyzes [Sto98]. anarchy [Flo97]. [Laz96]. Ailments [Nan96c, Nan96a]. aim Anatomy [Ano95o]. Animate [Ano96-93]. [Sin95a, VN97b]. aimed [Pou95d]. aims Animation [EP97, Nad95b]. anniversary [Los97c]. ain't [HM95]. Air [Ano95-111]. announced [Ano95-141]. [Ano95g, Ano97g, Bal95e, Rey96]. Air-tight announcements [Ano95-164]. annoying [Rey96]. Al [Gou95]. alarms [Ano98-81]. [Ano97v, Ano98-81, Gre97p]. annual algorithm [Ste95, Way95c]. algorithms [Pou95q]. anoint [Ano95d]. Answer [Cla95c, Dej95g, Gou95]. alike [Gil95]. [Ano95-105, Ano95-221, Nan97c, Gre95b, Alive [Smi96c, Ano97a]. all-in-one Gre95c, KH95, Pou96k, Ude98b]. Anti [BHKM96a, Hig95c]. alleged [Ano95w]. [Ano95-208]. Anti-Virus [Ano95-208]. any Alliances [Ano95-183]. allowed [Ano95-61]. [Ano95-61, Api95b, Gre96d]. Anyone allows [Dob97d, Joh96, MF97c]. Almost [Ano96f, Ess95, Ude98b]. anywhere [WS96, Bau95]. alone [Smi95b]. along [Ano95-212, Ano95-213, Bau95, Nee95m]. [Ano95c, Hig95c]. Alpha Apache [Ano98-79, Ude97j]. apart [Ano95m, Ano95-64, Ano97e, Ano97-115, [MFDG98]. APC [Ano97-71]. API Ano98-48, AG95, Api95c, Ban97, Chi96a, [Joh96, Tho97d]. APIs Fau95, Hal96h, Tho96d]. Alpha-based [Ano97-31, Die95a, Ano96-67]. App [Fau95]. Alpha-powered [Ano98-48]. [Ano95-82, Ano95-83, Gla95, Mel95, Sha98]. alphabet [Ano97g]. Alphabetical appear [Ano95g]. appearing [HM95]. [Ano96d, Ano96-79, Ano98-53, Ano98-54]. Apple [Ano95q, Ano95r, Ano95s, Alps [Hum96i]. ALR [RV96]. already Ano95-114, Ano95-104, Ano95-120, [Hal95a]. also [Ano95-106, Ano95-104, Ano95-164, Ano95-171, Ano95-203, Ano96g, Bal95h, BD95b, DM98, Gre95e, Hig95d, Ano96-173, Ano97i, Ano97-116, Ano98d, Hum96i, Krt98, Ric97, Tho96n, Vac95a]. Cot95a, Hal95d, MW95, Rei95e, Sch97a, AltaVista [VN97b]. altered [Way96g]. Tho95c, Tho95d, Tho95e, Tho95f, Tho95h, altering [Ano95-197]. Alternate [Ano95n]. Tho95j, Tho95l, Tho95m, Tho96g, Tho98a, Alternative [Ano96e, Ano95-151, Tho98c, Tho98e, Van96a]. Ano95-152, Ano95-195, Ano98n]. Apple-sanctioned [Ano95-120]. Apple's Alternatives [Ano98-65]. Am [Way97d]. Applet [Ano96-90, MF97c]. [Ano98-50, Kin96]. Amazing Applets [MF97a, Los97c, Tur97, Way96m]. [Kay97b,
Recommended publications
  • Ebook - Informations About Operating Systems Version: August 15, 2006 | Download
    eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org AIX Internet: AIX AmigaOS Internet: AmigaOS AtheOS Internet: AtheOS BeIA Internet: BeIA BeOS Internet: BeOS BSDi Internet: BSDi CP/M Internet: CP/M Darwin Internet: Darwin EPOC Internet: EPOC FreeBSD Internet: FreeBSD HP-UX Internet: HP-UX Hurd Internet: Hurd Inferno Internet: Inferno IRIX Internet: IRIX JavaOS Internet: JavaOS LFS Internet: LFS Linspire Internet: Linspire Linux Internet: Linux MacOS Internet: MacOS Minix Internet: Minix MorphOS Internet: MorphOS MS-DOS Internet: MS-DOS MVS Internet: MVS NetBSD Internet: NetBSD NetWare Internet: NetWare Newdeal Internet: Newdeal NEXTSTEP Internet: NEXTSTEP OpenBSD Internet: OpenBSD OS/2 Internet: OS/2 Further operating systems Internet: Further operating systems PalmOS Internet: PalmOS Plan9 Internet: Plan9 QNX Internet: QNX RiscOS Internet: RiscOS Solaris Internet: Solaris SuSE Linux Internet: SuSE Linux Unicos Internet: Unicos Unix Internet: Unix Unixware Internet: Unixware Windows 2000 Internet: Windows 2000 Windows 3.11 Internet: Windows 3.11 Windows 95 Internet: Windows 95 Windows 98 Internet: Windows 98 Windows CE Internet: Windows CE Windows Family Internet: Windows Family Windows ME Internet: Windows ME Seite 1 von 138 eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org Windows NT 3.1 Internet: Windows NT 3.1 Windows NT 4.0 Internet: Windows NT 4.0 Windows Server 2003 Internet: Windows Server 2003 Windows Vista Internet: Windows Vista Windows XP Internet: Windows XP Apple - Company Internet: Apple - Company AT&T - Company Internet: AT&T - Company Be Inc. - Company Internet: Be Inc. - Company BSD Family Internet: BSD Family Cray Inc.
    [Show full text]
  • Research Purpose Operating Systems – a Wide Survey
    GESJ: Computer Science and Telecommunications 2010|No.3(26) ISSN 1512-1232 RESEARCH PURPOSE OPERATING SYSTEMS – A WIDE SURVEY Pinaki Chakraborty School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi – 110067, India. E-mail: [email protected] Abstract Operating systems constitute a class of vital software. A plethora of operating systems, of different types and developed by different manufacturers over the years, are available now. This paper concentrates on research purpose operating systems because many of them have high technological significance and they have been vividly documented in the research literature. Thirty-four academic and research purpose operating systems have been briefly reviewed in this paper. It was observed that the microkernel based architecture is being used widely to design research purpose operating systems. It was also noticed that object oriented operating systems are emerging as a promising option. Hence, the paper concludes by suggesting a study of the scope of microkernel based object oriented operating systems. Keywords: Operating system, research purpose operating system, object oriented operating system, microkernel 1. Introduction An operating system is a software that manages all the resources of a computer, both hardware and software, and provides an environment in which a user can execute programs in a convenient and efficient manner [1]. However, the principles and concepts used in the operating systems were not standardized in a day. In fact, operating systems have been evolving through the years [2]. There were no operating systems in the early computers. In those systems, every program required full hardware specification to execute correctly and perform each trivial task, and its own drivers for peripheral devices like card readers and line printers.
    [Show full text]
  • A Complete Bibliography of Publications in Software—Practice and Experience
    A Complete Bibliography of Publications in Software|Practice and Experience Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 23 July 2021 Version 3.26 Title word cross-reference [Bar82a, Bar82c, Bar84b]. < [SMGMOFM07a, SMGMOFM07b]. > [SMGMOFM07a, SMGMOFM07b]. 2 [MST13, MDB19]. 3 [DS09]. 4 [MSR+07]. \ 0 [GW96]. 1 [GW96]. $1.50 [Bar78d]. $11 [PK04]. TM [MZB00, Win02]. 8 [DB21b]. k [Bar84a]. $12.00 [Rob72]. $13 [Bar84a]. [AW93, Mer93]. κ [MG94]. µ $13.00 [Rob72]. $18.50 [Jon74]. $185 [BS90c, BDS+92, SMNB21]. N [Bar79b]. $19.30 [Lan74a]. $19.50 [Dav78]. [MS98, Coh98, KST94, YAVHC21]. P 3 $25.00 [Pet77, And78]. 3 [BE02, FMA02]. [DC03]. PM [CLD+17]. q [GSR17]. τ $31-25 [Pet77]. $31.35 [Bri82]. 32 [VED06]. 2:5 [TSZ14, UDS+07]. $35.00 [Inc86]. $39.50 [Sim83]. 5 [CPMAH+20]. $58.50 [Wal81a]. $6.95 -ary [MS98]. -bit [AM10, SF85, VED06]. [Tho74]. 64 [AM10, VED06]. 68 -gram [Coh98, KST94, YAVHC21]. -grams [Ear76, Hol77]. $68.25 [Pit82]. $7.00 [GSR17]. -level [FM77]. -queens [Plu74]. [Bar72a]. $7.50 [Bar78d]. $7.95 -R [Ear76, Hol77]. -shortest-paths [MG94]. [Bar76a, Lav77]. $78.50 [Sim83]. 8 -System [BS90c]. [Plu74, SF85]. $8.95 [Bar82a, Bar82c, Bar84b]. $9.75 . [Bis81b]. .NET [Coo04, Han04]. [Bar77e, Mul76]. $9.80 [Atk79a]. $9.95 1 2 0 [Bar81, Edw98a, Edw98b, Gru83, Llo82, 2 [Bar74a, Bar74b, Bar80b, Bud85, Cor88b, Val77a, Val78, Wal83b].
    [Show full text]
  • The Symbian OS Architecture Sourcebook
    The Symbian OS Architecture Sourcebook The Symbian OS Architecture Sourcebook Design and Evolution of a Mobile Phone OS By Ben Morris Reviewed by Chris Davies, Warren Day, Martin de Jode, Roy Hayun, Simon Higginson, Mark Jacobs, Andrew Langstaff, David Mery, Matthew O’Donnell, Kal Patel, Dominic Pinkman, Alan Robinson, Matthew Reynolds, Mark Shackman, Jo Stichbury, Jan van Bergen Symbian Press Head of Symbian Press Freddie Gjertsen Managing Editor Satu McNabb Copyright 2007 Symbian Software, Ltd John Wiley & Sons, Ltd The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England Telephone (+44) 1243 779777 Email (for orders and customer service enquiries): [email protected] Visit our Home Page on www.wileyeurope.com or www.wiley.com All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, or emailed to [email protected], or faxed to (+44) 1243 770620. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners.
    [Show full text]
  • Sealing OS Processes to Improve Dependability and Security
    Sealing OS Processes to Improve Dependability and Safety Galen Hunt, Mark Aiken, Manuel Fähndrich, Chris Hawblitzel, Orion Hodson, James Larus, Steven Levi, Bjarne Steensgaard, David Tarditi, and Ted Wobber Microsoft Research One Microsoft Way Redmond, WA 98052 USA [email protected] ABSTRACT General Terms In most modern operating systems, a process is a Design, Reliability, Experimentation. hardware-protected abstraction for isolating code and data. This protection, however, is selective. Many common Keywords mechanisms—dynamic code loading, run-time code Open process architecture, sealed process architecture, sealed generation, shared memory, and intrusive system APIs— kernel, software isolated process (SIP). make the barrier between processes very permeable. This paper argues that this traditional open process architecture 1. INTRODUCTION exacerbates the dependability and security weaknesses of Processes debuted, circa 1965, as a recognized operating modern systems. system abstraction in Multics [48]. Multics pioneered As a remedy, this paper proposes a sealed process many attributes of modern processes: OS-supported architecture, which prohibits dynamic code loading, self- dynamic code loading, run-time code generation, cross- modifying code, shared memory, and limits the scope of process shared memory, and an intrusive kernel API that the process API. This paper describes the implementation permitted one process to modify directly the state of of the sealed process architecture in the Singularity another process. operating system,
    [Show full text]
  • A Visual Programming Language for Data Flow Systems
    Rochester Institute of Technology RIT Scholar Works Theses 10-14-1988 A Visual Programming Language for Data Flow Systems Timothy J. Wilson Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Wilson, Timothy J., "A Visual Programming Language for Data Flow Systems" (1988). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Rochester Institute of Technology School of Computer Science and Technology A Visual Programming Language for Data Flow Systems by Timothy J. Wilson A thesis submitted to The Faculty of the School of Computer Science and Technology in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. Approved by: Dr. Peter Lutz 10-18-88 Dr. Andrew Kitchen 10-18-88 Dr. Peter Anderson 10-18-88 October 14, 1988 Abstract The concept ofvisual programming languages is described and some necessary terms are defined. The value of visual languages is presented and a number of different visual languages are described. Various issues, such as user interface design, are discussed. As an example of a visual programming language, a graphical data flow programming environment is developed for the Macintosh workstation which functions as a preprocessor to a data flow simulator developed at RIT. Examples are presented demonstrating the use of the language environment. Issues related to the devel opment of the programming environment are described and conclusions regarding the development ofvisual programming languages in general are presented.
    [Show full text]
  • Study on Operating Systems for Small Devices for Mobile Payments Application 17 Th July, 2009
    Study on Operating Systems for Small Devices for Mobile Payments Application 17 th July, 2009 Project Report On Study on Operating Systems for Small Devices for Mobile Payments Application Submitted by: V V Aishwarya B.E IV/IV (01-07-862) Department of Computer Science and Engineering (CSE) University College of Engineering (Autonomous) Osmania University , Hyderabad- 500004 To Summer Internship Project under the Guidance of Dr. V N Sastry Associate Professor Institute for Development and Research in Banking Technology (IDRBT) (Established by Reserve Bank of India) Road No. 1, Castle Hills, Masab Tank, Hyderabad – 500 057. July 2009 CSE,UCE,OU 1 IDRBT Study on Operating Systems for Small Devices for Mobile Payments Application 17 th July, 2009 CERTIFICATE This is to certify that this project on “ Study on Operating Systems for Small Devices for Mobile Payments Application ” submitted by Ms. V V Aishwarya , 01-07-862 of B.E. IV/IV, CSE, University College of Engineering, Osmania University, is a record of Bonafide work done by her under my guidance during the Summer Internship Programme from 21 st May, 2009 to 17 th July, 2009. Ms. V V Aishwarya has completed the work assigned to her within the limited period of learning and execution. She has successfully completed the project to my satisfaction and it has been observed that the goals set upon at the outset of this endeavor have been worked upon to the best of the student’s abilities and resources. During this period I have observed her to be very sincere, hardworking and coping up with new challenges.
    [Show full text]
  • CS 162 Operating Systems and Systems Programming Lecture 3
    CS 162 Operating Systems and Systems Programming Answer: Decompose hard problem into simpler ones. Instead of dealing with Professor: Anthony Joseph everything going on at once, separate into logical abstractions that we can deal Spring 2004 with one at a time. Lecture 3: 3.2 Processes Concurrency: Processes, Threads, and Address Spaces The notion of a “process” is a central concept for Operating Systems. 3.0 Main point: What are processes? Process: Operating system abstraction to represent what is needed to run a single How are they related to threads and address spaces? program (this is the traditional UNIX definition) Formally, a process is a sequential stream of execution in its own address space. 3.1 Concurrency 3.1.1 Definitions: 3.2.1 Two parts to a (traditional Unix) process: Uniprogramming: one process at a time (e.g., MS/DOS, early Macintosh) 1. Sequential program execution: the code in the process is executed as a single, sequential stream of execution (no concurrency inside a process). This Easier for operating system builder: get rid of problem of concurrency by defining is known as a thread of control. it away. For personal computers, idea was: one user does only one thing at a 2. State Information: everything specific to a particular execution of a program: time. Encapsulates protection: address space • CPU registers Harder for user: can’t work while waiting for printer • Main memory (contents of address space) • I/O state (in UNIX this is represented by file descriptors) Multiprogramming: more than one process at a time (UNIX, OS/2, Windows NT).
    [Show full text]
  • Automatic Data Visualization for Novice Pascal Programmers
    Automatic Data Visualization for Novice Pascal Programmers Brad A. Myers Ravinder Chandhok Atul Sareen Computer Science Department Camegie Mellon University Pittsburgh, PA 15213-3890 (412) 268-2565 [email protected] ABSTRACT were designed to explain important concepts, such as which dimension of a multi-dimensioned array comes first, and Previous work has demonstrated that presenting the data which types are assignment compatible. In addition, a structures from programs in a graphical manner can graphic artist participated in the design so the pictures will be significantly help programmers understand and debug their visually appealing. programs. In most previous systems, however, the graphical displays, called data visualizations, had to be laboriously Graphical presentations for data structures are important for a hand created. The Amethyst system, which runs on Apple number of reasons. Human information processing is clearly Macintosh computers, provides attractive and appropriate optimized for pictorial information, and pictures make the default displays for data structures. The default displays data easier to understand for the programmer. This will make include the appropriate forms for literals of the simple types program debugging and program comprehension easier, inside type-specific shapes, and stacked boxes for records because the pictures provide a higher level of abstraction that and arrays. In the near future, we plan to develop rules for removes a number of irrelevant details. In particular, some layout of simple dynamic data structures (like linked lists and of the programming concepts that students have particular binary trees), and simple mechanisms for creating difficulty with can be much better explained with pictures. customized displays.
    [Show full text]
  • Taxonomies of Visual Programming and Program Visualization
    Taxonomies of Visual Programming and Program Visualization Brad A. Myers September 20, 1989 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213-3890 [email protected] (412) 268-5150 The research described in this paper was partially funded by the National Science and Engineering Research Council (NSERC) of Canada while I was at the Computer Systems Research Institute, Univer- sity of Toronto, and partially by the Defense Advanced Research Projects Agency (DOD), ARPA Order No. 4976 under contract F33615-87-C-1499 and monitored by the Avionics Laboratory, Air Force Wright Aeronautical Laboratories, Aeronautical Systems Division (AFSC), Wright-Patterson AFB, OH 45433-6543. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the of®cial policies, either expressed or implied, of the Defense Advanced Research Projects Agency of the US Government. This paper is an updated version of [4] and [5]. Part of the work for this article was performed while the author was at the University of Toronto in Toronto, Ontario, Canada. Taxonomies of Visual Programming and Program Visualization Brad A. Myers ABSTRACT There has been a great interest recently in systems that use graphics to aid in the programming, debugging, and understanding of computer systems. The terms ``Visual Programming'' and ``Program Visualization'' have been applied to these systems. This paper attempts to provide more meaning to these terms by giving precise de®nitions, and then surveys a number of sys- tems that can be classi®ed as providing Visual Programming or Program Visualization. These systems are organized by classifying them into three different taxonomies.
    [Show full text]
  • The Niagara Framework
    The Niagara Framework Control System Interoperability with Seamless Intranet/Internet Enterprise Connectivity © Copyright 1998 Tridium, Inc., All Rights Reserved Tridium, Inc. 3951 Westerre Parkway Suite 350 Richmond, Virginia 23233 (804) 747-4771 http://www.tridium.com Ernie Allen, Technical Services Manager John Bishop, Regional Manager Copyright Notice: The software described herein is furnished under a license agreement and may be used only in accordance with the terms of the agreement. © Copyright 1998 Tridium, Inc. All rights reserved. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without prior written consent from Tridium, Inc., 3951 Westerre Parkway, Suite 350, Richmond, Virginia 23233. The confidential information contained in this document is provided solely for use by Tridium employees, licensees, and system owners; and is not to be released to, or reproduced for, anyone else; neither is it to be used for reproduction of this Control System or any of its components. All rights to revise designs described herein are reserved. While every effort has been made to assure the accuracy of this document, Tridium shall not be held responsible for damages, including consequential damages, arising from the application of the information given herein. The information in this document is subject to change without notice. The release described in this document may be protected by one of more U.S. patents, foreign patents, or pending applications. Trademark Notices: Microsoft and Windows are registered trademarks, and Windows 95, Windows NT, and Internet Explorer are trademarks of Microsoft Corporation. Java and other Java-based names are trademarks of Sun Microsystems Inc.
    [Show full text]
  • Sealing OS Processes to Improve Dependability and Security
    MSR-TR-2006-51 This is a draft paper that is under submission. Please contact Galen Hunt for citation information. Sealing OS Processes to Improve Dependability and Security Galen Hunt, Mark Aiken, Paul Barham, Manuel Fähndrich, Chris Hawblitzel, Orion Hodson, James Larus, Steven Levi, Nick Murphy, Bjarne Steensgaard, David Tarditi, Ted Wobber, Brian Zill Microsoft Research Abstract On most modern operating systems, a process is a hardware-protected abstraction for executing potentially mutable code and data. Common features of processes include: dynamic code loading, dynamic code generation, access to cross-process shared memory, and a universal API. This paper argues that many of the dependability and security weaknesses of modern systems are exacerbated by this open process architecture. Moreover, this architecture impairs the ability of tools to analyze code statically, to improve its performance or dependability. By contrast, a sealed process architecture prohibits dynamic code loading, prohibits self-modifying code, prohibits shared memory, and replaces a universal API with a process-limited API. This paper describes an implementation of a sealed process architecture in the Singularity operating system, discusses its merits, and evaluates its impact. Among the benefits are: improved static program analysis, strong security guarantees, elimination of OS redundancies found in language runtimes such as the JVM and CLR, and better software engineering. 1. Introduction 1.1. Disadvantages of Open Processes The process, as a recognized operating system Although common, open processes are not “free.” abstraction, debuted in Multics [52] in the 1960s. This architecture has negative consequences for Multics processes included support for dynamic code dependability, correctness, security, and performance.
    [Show full text]