ASOSI: Asymmetric Operating System Infrastructure

Yair Wiseman

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

At the present time, when the usage of super-computers has been brought into play and turned out to be more widespread, the research of Asymmetric Operating Systems has been gathering speed, because super-computers more often than not run an Asymmetric Operating System. In this paper some new algorithms and implementations designed in our group and based on our ASOSI framework are presented.

Original languageEnglish
Title of host publication21st ISCA International Conference on Parallel and Distributed Computing and Communication Systems, PDCCS 2008
EditorsJoseph C. Jacob, Dimitrios Serpanos
PublisherInternational Society for Computers and Their Applications (ISCA)
Pages193-198
Number of pages6
ISBN (Electronic)9781605604480
StatePublished - 2008
Event21st International Conference on Parallel and Distributed Computing and Communication Systems, PDCCS 2008 - New Orleans, United States
Duration: 24 Sep 200826 Sep 2008

Publication series

Name21st ISCA International Conference on Parallel and Distributed Computing and Communication Systems, PDCCS 2008

Conference

Conference21st International Conference on Parallel and Distributed Computing and Communication Systems, PDCCS 2008
Country/TerritoryUnited States
CityNew Orleans
Period24/09/0826/09/08

Bibliographical note

Funding Information:
The author would like to thank the graduate student students in his research group - Moshe Itshak, Ilan Grinberg, Moti Geva, Oshi Keren-Zur and Pinchas Weisberg for their help. The author would also like to thank SUN Microsystems for their donation.

Publisher Copyright:
Copyright © 2008 by the International Society for Computers and Their Applications (ISCA). All rights reserved.

Keywords

  • Memory Management
  • Operating Systems
  • Parallel and Distributed Systems
  • Process Scheduling

Fingerprint

Dive into the research topics of 'ASOSI: Asymmetric Operating System Infrastructure'. Together they form a unique fingerprint.

Cite this