Operating Systems 2017 Spring


 

¤½§i¡G ¥»¶g·s¼WChap. 1 (1.9 ¡V 1.12) ±Ð¾Çµø°T

Course Information

Instructor : Min-Shiang Hwang (¶À©ú²»)

Office: I-420
Tel : 1864
E-mail :
isrc@asia.edu.tw

Skype: minshiang

Facebook¡Ghttp://www.facebook.com/isrc (isrc@nchu.edu.tw)

Textbook:

Silberschatz, Galvin, and Gagne, Operating System Concepts, 8th edition, John Wiley & Sons. Inc.

Class period: Tue PM 1:10~4:00  (Classroom: H-214)

Office Hours (Discussion Time):

Mon PM 1:30~4:30, Thu PM 1:30~4:30

Grading:

Exam: Midterm 30%, Final 30 %.

Homework: 5%.

Final Report: 20%.

In-class Exam: 10%

Class attendance: 5%

 

Teaching material:

 

Slides

DVD

Homeworks

Chapter 1: Introduction

Ch01

OS-dvd-01-1

OS-dvd-01-2

OS-dvd-01-9

OS-dvd-01-10

OS-dvd-01-11

OS-dvd-01-12

OS-h01

Chapter 2: System Structures

Ch02

OS-dvd-02-1

OS-dvd-02-2

OS-dvd-02-3

OS-dvd-02-4

OS-dvd-02-5

OS-dvd-02-6

OS-dvd-02-7

OS-dvd-02-8

OS-dvd-02-9

OS-dvd-02-10

OS-dvd-02-11

OS-h02

Chapter 3: Process Concept

Ch03

OS-dvd-03-1

OS-dvd-03-2

OS-dvd-03-3

OS-h03

Chapter 4: Multithreaded Programming

Ch04

 

OS-h04

Chapter 5: Process Scheduling

Ch05

 

OS-h05

Chapter 6: Synchronization

Ch06

OS-dvd-06-1

OS-dvd-06-2

OS-dvd-06-3

OS-dvd-06-4

OS-dvd-06-5

OS-dvd-06-6

OS-dvd-06-7

OS-h06

Chapter 7: Deadlocks

Ch07

OS-dvd-07-1

OS-dvd-07-2

OS-dvd-07-3

OS-dvd-07-4

OS-dvd-07-5

OS-dvd-07-6

OS-dvd-07-7

OS-h07

Chapter 8: Memory-Management Strategies

Ch08

 

OS-h08

Chapter 9: Virtual-Memory Management

Ch09

 

OS-h09

Chapter 10: File-System

Ch10

 

OS-h10

Chapter 11: Implementing File Systems

Ch11

 

OS-h11

Chapter 12: Secondary-Storage Structure

 

Ch12

 

OS-h12

Chapter 13: I/O Systems

Ch13

 

OS-h13

Chapter 14: System Protection

Ch14

 

OS-h14

Chapter 15: System Security

Ch15

 

OS-h15

 

Homework: 102-1

Final Report: ´Á¥½³ø§iÃD¥Ø

 

External Resource (TED, CTITV):

Harald Haas: Wireless data from every light bulb

Eric Giler demos wireless electricity

¨â©¤¶³ºÝ²£·~µ²¦X ¥_¨Ê®i²{¶³ªº³t«×

¥_¨Ê¶³°ò¦a  ¶³ºÝÄƶi§A§Úªº¥Í¬¡

«H®§¶Ç»¼µL©Ò¤£¦b¡@ª«Ápºô²£·~¥¿Éq

¤¤°ê³y¶³§Ö³t¡B¥ý¶i¡@¨â©¤Äâ¤â¬D¾Ô¦è¤è¤j¼t

George Dyson: ¹q¸£ªº½Ï¥Í

­p·§¤G´Á¥½¼v¤ù³Ì²×ª©.avi

¤j½Ãº~´Ë (David Hanson) ¡G±¡·PÂ×´Iªº¾÷¾¹¤H

David Bismark: E-voting without fraud

±j¥§§õ ¡X Will ·n±ì©~µM¯à³o¼Ë¥Î

TEDxTaipei 2011 - Dr. Hong-yuan Lee (§õÂE·½)

Incredibox http://www.incredibox.com/en/#/application

¥Îexcelµe¹Ï  http://www.youtube.com/watch?v=h9yi8aezHFA 
Emart sunny sale 
http://www.youtube.com/watch?v=EvIJfUySmY0

 

Papers:

IJACT, V4, N2, 2012: Security Weaknesses and Improvements of a Fingerprint-based Remote User Authentication Scheme Using Smart Cards

WPC, Sept. 2012: Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication

 

Examination:

1.    Midterm Exam. Solution - 2013-1

2.    Final Exam. Solution - 2013-1

 

 

 

Copyright ©2014 by ISRC Lab. All Rights Reserved. All trademarks are acknowledged to belong to their respective owners.