Advanced SearchSearch Tips
Address Space Maintaining Scheme for Fast Program Execution in Linux-based Systems
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Address Space Maintaining Scheme for Fast Program Execution in Linux-based Systems
Noh, Seung Joon; Kang, Dong Hyun; Kim, Junghan; Kim, Inhyeok; Eom, Young Ik;
The environment of Internet of Things (IoT) wherein various devices are connected through the Internet with value-added network functions, is currently a subject of active study. Accordingly, the existing computing environment based on desktop or mobile systems is being expanded into a computing environment of more diverse devices. Because the response of program launching is important in terms of User Experience (UX) in IoT environments, the technology for guaranteeing rapid response of program launching in IoT devices is getting the focus of much current research. In this paper we analyze the Zygote technique, which is being used for faster program execution in Android systems, and, based on our results, we propose an address space maintaining scheme for the rapid launching of programs for use in Linux-based systems. Our scheme utilizes the Copy on Write (CoW) technique in Linux systems as well as the Zygote technique of Android systems. In order to evaluate the proposed scheme, we implemented our scheme on Linux systems and performed several experiments. The experimental results show that the proposed scheme shortens the launching time up to 99%, compared to the existing technique.
Linux;Android Zygote technique;Copy on Write technique;address space maintaining technique;
 Cited by
N. Tolia, D. G. Andersen, and M. Satyanarayanan, "Quantifying Interactive User Experience on Thin Clients," Journal of Computer, Vol. 39, No. 3, Mar. 2006.

R. West and G. Parmer, "Application-Specific Service Technologies for Commodity Operating Systems in Real-Time Environments," Journal of the ACM Transactions on Embedded Computing Systems, Vol. 10, No. 30, Apr. 2011.

Zygote $\mid$ Anatomy of Android [Online]. Available: (Sep, 28, 2015)

L. K. Yan and H. Yin, "DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis," Proc. of the USENIX Security Symposium 2012, pp. 569-584, 2012.

C. Jung, D. Woo, K. Kim, and S. Lim, "Performance Characterization of Prelinking and Preloading for Embedded Systems," Proc. of the 7th ACM & IEEE International Conference on Embedded software 2012, pp. 213-220, 2007.

J. M. Redondo and F. Ortin, "A Comprehensive Evaluation of Common Python Implementations," Journal of the Software, IEEE, Vol. 32, No. 4, Aug. 2014.

Y. Chen and R. Sion, Costs and Security in Clouds, pp. 50. Springer, New York, 2014.

N. J. Nilsson, Principles of Artificial Intelligence, pp. 55. Springer, New York, 1982.

S. A. Finney, "Real-time Data Collection in Linux: A Case Study," Journal of the Behavior Research Methods, Instruments, & Computers, Vol. 33, No. 2, May. 2001.

D. P. Bovet and M. Cesati, Understanding the Linux Kernel, 3nd ed., pp. 115. O'Reilly Media, Inc. California, 2005.