Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

System call

Known as: INT 0x80, Syscall, Call 
In computing, a system call is the programmatic way in which a computer program requests a service from the kernel of the operating system it is… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
In a contemporary data center, Linux applications often generate a large quantity of real-time system call traces, which are not… Expand
  • figure 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Accurate, fine-grained online energy estimation and accounting of mobile devices such as smartphones is of critical importance to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
For the past 30+ years, system calls have been the de facto interface used by applications to request services from the operating… Expand
  • figure 1
  • table 1
  • figure 4
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Intrusion detection systems (IDSs) are used to detect traces of malicious activities targeted against the network and its… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
Highly Cited
2003
Highly Cited
2003
  • Niels Provos
  • USENIX Security Symposium
  • 2003
  • Corpus ID: 17221461
Many operating system services require special privilege to execute their tasks. A programming error in a privileged service… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
  • Yuguang Fang, Yi Zhang
  • IEEE Trans. Veh. Technol.
  • 2002
  • Corpus ID: 2038986
Call admission control (CAC) plays a significant role in providing the desired quality of service in wireless networks. Many CAC… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1998
Highly Cited
1998
A method is introduced for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of… Expand
  • table 1
  • table 3
  • table 2
  • table 4
  • table 6
Is this relevant?
Highly Cited
1997
Highly Cited
1997
This document describes release 2.0 of the SimpleScalar tool set, a suite of free, publicly available simulation tools that offer… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Unusual behavior in computer systems can be detected by monitoring the system calls being executed by programs. Analysis of the… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 6
Is this relevant?