Page 63 - REVISTAA_FINAL_MIRANDA_VERONICA_Y_AGUIRRE_EMILY
P. 63
Referencias [13] M. Vrable, J. Ma, J. Chen, D. Moore, E.
Vandekieft, A. Snoeren, G. Voelker y S. Savage,
[1] A. Tanenbaum, «Sistemas Operativos,» 3ra ed.,
México, Pearson, 2009, pp. 76-77. «Scalability, Fidelity, and Containment in the
Potemkin Virtual Honeyfarm,» Proc. 20th Symp.
on Operating Systems Principles, pp. 148-162,
[2] O. Krieger, M. Auslander, B. Rosenburg, R. W. 2005.
Wisniewski, J. Xenidis, D. Da Silva, M.
Ostrowski, J. Appavoo, M. Butrico, M. Mergen,
A. Waterland y V. Uhlig, «K42: Building a [14] A. Hou, J. Yang, B. Chelf, S. Hallem y D.
Complete Operating System,» Proc. Eurosys Engler, «An Empirical Study of Operating
200, pp. 133-145, 2006. System Errors,» Proc. 18th Symp on Operating
Systems Design and Implementation,, pp. 73-88,
2001.
[3] J. Fassino, F. Stefani, J. Lawall y G. Muller,
«Think: A Software Framework for,» Proc. [15] S. King, D. G. y P. Chen, «Debugging Operating
Annual Tech. Conf., USENIX, pp. 73-86, 2002.
Systems with Time-Traveling Virtual,» Proc.
Annual Tech. Conf, pp. 1-15, 2005.
[4] K. Elphinstone, G. Klein, P. Derrin, T. Roscoe y
G. Heiser, «Towards a Practical, Verified,
Kernel,» Proc. 11th Workshop on Hot Topics in [16] A. Fedorova, M. Seltzer, S. C. y D. Nussbaum,
«Performance of Multithreaded Chip,» Proc.
Operating Systems, pp. 117-122, 2007.
Annual Tech. Conf, pp. 395-398, 2005.
[5] R. Kumar, D. Tullsen, N. Jouppi y P.
Ranganathan, «Heterogeneous Chip [17] J. Bulpin y I. Pratt, «Hyperthreading-Aware
Multiprocessors,» Computer, pp. 32-38, 2005. Process Scheduling Heuristics,» Proc. Annual
Tech., pp. 399-403, 2005.
[6] L. Yang y L. Peng, «SecCMP: A Secure Chip-
Multiprocessor Architecture,» Proc. 1st [18] H. Yu, D. Agrawal y A. El Abbadi, «MEMS-
Workshop on Architectural and System Support Based Storage Architecture for Relational
for Improving Software Dependability, pp. 72- Databases,» VLDB J, vol. 16, pp. 251-268, 2007.
76, 2006.
[19] D. Luis, «Sistemas operativos,» La Red
Martinez, 2001, pp. 8-10.
[7] M. Swift, M. Annamalai, B. Bershad y H. Levy,
«Recovering Device Drivers,» ACM Trans. On
Computer Systems, vol. 24, pp. 333-360, 2006. [20] F. Corbató, M. Merwin-Daggett y R. Daley, «An
experimental time-sharing system. In
Proceedings of the May 1-3, 1962,» Spring joint
[8] J. Levasseur, V. Uhlig, J. Stoess y S. Gotz,
«Unmodified Device Driver Reuse and computer conference , pp. 335-344, 1962.
Improved System Dependability via Virtual
Machines,» Proc. Sixth Symp. on Operating [21] H. Ortiz Pabón, «Sistemas Operatviso
System Design and, pp. 17-30, 2004. Modernos,» Medellín, Universidad de Medellín,
2005, pp. 25-28.
[9] P. Barham, B. Dragovic, K. Fraser, S. Hand, T.
Harris, A. Ho y R. Neugebauer, «Xen and the [22] A. S. Tanenbaum, Sistemas Operativos: diseño e
Art of Virtualization,» Proc, 19th Symp. on implementación, Prentice Hall: México, 1998.
Operating, pp. 164-177, 2003.
[23] C. Belloch, Belloch, C. (2012). Las Tecnologías
[10] S. King, G. Dunlap y P. Chen, «Operating de la Información y Comunicación en el
System Support for Virtual Machines,» Proc. aprendizaje, Universidad de Valencia:
Annual Tech. Conf, pp. 71-84, 2003. Departamento de Métodos de Investigación y
Diagnóstico en Educación., 2012.
[11] M. Costa, J. Crowcroft, M. Castro, A. Rowstron,
L. Zhou, L. Zhang y P. Barham, «Vigilante:
End-to-End Containment of Internet Worm,»
Proc. 20th Symp. on Operating System, pp. 133-
147, 2005.
[12] G. Portokalidis, A. Slowinska y H. Bos,
«ARGOS: An Emulator of Fingerprinting Zero-
Day,» Proc. Eurosys 2006, pp. 15-27, 2006.
63