Fault Tolerance Through Redundant Execution on COTS Multicores: Exploring Trade-Offs | 0 | 0.34 | 2019 |
L4 Microkernels: The Lessons from 20 Years of Research and Deployment. | 8 | 0.52 | 2016 |
An Evaluation of Coarse-Grained Locking for Multicore Microkernels. | 1 | 0.35 | 2016 |
For a Microkernel, a Big Lock Is Fine | 3 | 0.40 | 2015 |
Microkernel Mechanisms for Improving the Trustworthiness of Commodity Hardware | 0 | 0.34 | 2015 |
Comprehensive formal verification of an OS microkernel | 80 | 2.54 | 2014 |
Increasing the trustworthiness of commodity hardware through software | 0 | 0.34 | 2013 |
From L3 to seL4 what have we learnt in 20 years of L4 microkernels? | 42 | 1.27 | 2013 |
Application level ballooning for efficient server consolidation | 24 | 0.89 | 2013 |
Trustworthy Real-Time Systems. | 0 | 0.34 | 2012 |
The road to trustworthy systems | 3 | 0.42 | 2010 |
Towards proving security in the presence of large untrusted components | 17 | 0.92 | 2010 |
seL4: formal verification of an operating-system kernel | 84 | 5.86 | 2010 |
Experience report: seL4: formally verifying a high-performance microkernel | 13 | 1.09 | 2009 |
Towards Real Multi-criticality Scheduling | 8 | 0.76 | 2009 |
seL4: formal verification of an OS kernel | 584 | 19.89 | 2009 |
Verified Protection Model of the seL4 Microkernel | 17 | 2.16 | 2008 |
Towards trustworthy computing systems: taking microkernels to the next level | 37 | 2.72 | 2007 |
Towards a practical, verified kernel | 23 | 2.29 | 2007 |
Running the manual: an approach to high-assurance microkernel development | 22 | 1.99 | 2006 |
User-Level Device Drivers: Achieved Performance | 65 | 2.75 | 2005 |
Initial Evaluation of a User-Level Device Driver Framework | 3 | 0.86 | 2004 |
User-Level Management of Kernel Memory | 5 | 0.68 | 2003 |
The sawmill framework for virtual memory diversity | 8 | 0.56 | 2001 |
The SawMill multiserver approach | 27 | 1.86 | 2000 |
Preliminary thoughts on memory-bus scheduling | 6 | 0.63 | 2000 |
Synchronous IPC over transparent monitors | 5 | 0.50 | 2000 |
How to schedule unlimited memory pinning of untrusted processes or provisional ideas about service-neutrality | 5 | 0.88 | 1999 |
Flexible Access Control using IPC Redirection | 7 | 1.10 | 1999 |
The Mungi single-address-space operating system | 54 | 4.83 | 1998 |
Achieved IPC Performance | 25 | 2.95 | 1997 |
Guarded page tables on Mips R4600 or an exercise in architecture-dependent micro optimization | 8 | 0.62 | 1996 |
Supporting Persistent Object Systems In A Single Address Space | 6 | 2.10 | 1996 |