نتایج جستجو برای: multiple byte fault

تعداد نتایج: 821636  

2012
Sameer Shrivastava

I. Abstract Byte sequences are used in multiple network intrusion detection systems (NIDS) as signatures to detect nasty activity. Though being highly competent, a high rate of false-positive rate is found. Here we suggest the concept of contextual signatures as an enhancement to string-based signaturematching. Instead of matching isolated fixed strings, we enhance the matching process with add...

2000
Athena Vakali

Caching has been introduced and applied in prototype and commercial Web-based information systems in order to reduce the overall bandwidth and increase system’s fault tolerance. This paper presents a track of Web cache replacement algorithms based on the Least Recently Used (LRU) idea. We propose an extension to the conventional LRU algorithm by considering the number of references to Web objec...

2014
Jyotika Doshi Savita Gandhi

Byte pair encoding (BPE) algorithm was suggested by P. Gage is to achieve data compression. It encodes all instances of most frequent byte-pair using zero-frequency byte in the source data. This process is repeated for maximum m possible number of passes until no further compression is possible, either because there are no more frequently occurring byte pairs or there are no more unused zero-fr...

2010
Zbigniew CZAPLA

The paper presents a method of image segmentation applying the half-byte data format. The half-byte data format is an image representation that consists of two types of image pixel values, pixel base values and calculated pixel difference values. Original image pixel value is obtained by joining pixel difference value and corresponding base pixel value. The layout of base pixels value is in acc...

Journal: :CoRR 2013
Minjia Shi

The m-spotty byte error control codes provide a good source for detecting and correcting errors in semiconductor memory systems using high density RAM chips with wide I/O data (e.g. 8, 16, or 32 bits). m-spotty byte error control codes are very suitable for burst correction. M. Özen and V. Siap [7] proved a MacWilliams identity for the m-spotty Rosenbloom-Tsfasman (shortly RT) weight enumerator...

2014
Harshal Tupsamudre Shikha Bisht Debdeep Mukhopadhyay

Researchers have demonstrated the ineffectiveness of deterministic countermeasures and emphasized on the use of randomness for protecting cryptosystems against fault attacks. One such countermeasure for AES was proposed in LatinCrypt 2012, which masks the faulty output with secret values. However this countermeasure does not affect the erroneous byte in the faulty computation of the last AES ro...

1998
Achour Mostéfaoui Oliver E. Theel

Almost all published work on causal ordering mechanisms assumes theoretically unbounded counters for timestamps, thus ignoring the real-world problem that arises if one is actually interested in an operable implementation, since unbounded counters simply cannot be realized. An argument for its justification often encountered states, that the counter size can be chosen such that counters practic...

Journal: :IEEE Trans. Information Theory 1998
Gui Liang Feng Xinwen Wu T. R. N. Rao

Error-correcting or error-detecting codes have been used in the computer industry to increase reliability, reduce service costs, and maintain data integrity. The single-byte error-correcting and double-byte error-detecting (SbEC-DbED) codes have been successfully used in computer memory subsystems. There are many methods to construct double-byte error-correcting (DbEC) codes. In the present pap...

1999
Markus Dahm

The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code instructions. Several research projects deal with byte code-generating compilers or the implementation of new features via byte code transformations. Examples are code optimization, the implementation of parameterized types...

2016
Hui Lu

Virtualization-based cloud computing has dominated today’s data centers by supporting consolidated servers, converged infrastructures, horizontal scalability, and cost of ownership reduction. As the demands of cloud-based services continue to grow, numerous enabling technologies have been developed such as system virtualization (e.g., VM, container and NFV), software-defined management (for com...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید