Learn More
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacy-sensitive tasks, becoming highly valuable targets for attackers. They are also quite different from PCs, so that PC-oriented solutions are not always applicable, or do not offer comprehensive security. We propose an alternative solution, where(More)
frastructure is still lacking. We propose Globe: a novel scalable infrastructure for a massive worldwide distributed system. Currently, designers build applications on top of a limited number of communication services. On the Internet, for example , this means that applications communicate mainly through transmission-control protocol (TCP) connections, but(More)
Locating mobile objects in a worldwide system requires a scalable location service. An object can be a telephone or a notebook computer, but also a software or data object, such as a file or an electronic document. Our service strictly separates an object's name from the addresses where it can be contacted. This is done by introducing a location-independent(More)
Studies have shown that device drivers and extensions contain 3-7 times more bugs than other operating system code and thus are more likely to fail. Therefore, we present a failure-resilient operating system design that can recover from dead drivers and other critical components - primarily through monitoring and replacing malfunctioning components on the(More)
In this paper, we discuss the architecture of a modular UNIX-compatible operating system, MINIX 3, that provides reliability beyond that of most other systems. With nearly the entire operating system running as a set of user-mode servers and drivers atop a minimal kernel, the system is fully compartmentalized. By moving most of the code to unprivileged(More)
Developing large-scale wide-area applications requires an infrastructure that is presently lacking entirely. Currently, applications have to be built on top of raw communication services, such as TCP connections. All additional services, including those for naming, replication, migration , persistence, fault tolerance, and security, have to be implemented(More)
BACKGROUND AND PURPOSE Intracranial arterial stenosis (ICAS) in patients with recent ischemic stroke is associated with a high risk of recurrent stroke. More insight into the pathophysiology of ICAS could help identify patients at high risk requiring more aggressive secondary prevention. We evaluated the prevalence, distribution, calcification, and the risk(More)
It has been well established that most operating system crashes are due to bugs in device drivers. Because drivers are normally linked into the kernel address space, a buggy driver can wipe out kernel tables and bring the system crashing to a grinding halt. We have greatly mitigated this problem by reducing the kernel to an absolute minimum and running each(More)
BACKGROUND AND PURPOSE Complicated (irregular or ulcerated) carotid plaques have proven to be independent predictors of stroke. We analyzed the frequency and location of plaque irregularities in a large cohort of patients with ischemic cerebrovascular disease and the relation with severity of stenosis, cardiovascular risk factors, and symptomatology. (More)
Different kinds of people use computers now than several decades ago, but operating systems have not fully kept pace with this change. It is true that we have point-and-click GUIs now instead of command line interfaces, but the expectation of the average user is different from what it used to be, because the user is different. Thirty or 40 years ago, when(More)