نتایج جستجو برای: monitors
تعداد نتایج: 11136 فیلتر نتایج به سال:
Protecting computational resources and digital information against unauthorized access is one of the fundamental security requirements in modern computer systems. Usage control addresses the control of computational resources after access has been granted. Despite its fundamental importance, no systematic methods exist to implement formal usage control specifications. This paper presents a mode...
Apnea is a Greek word meaning “without wind.” Apnea, in the modern lexicon, refers to the cessation of breathing and is a reversible condition if caught early enough. Apneic events fall under one of three classifications—central, obstructive, or mixed. The event is classified as “central apnea” if the brain stops sending the signals to the chest muscles to expand, causing inhalation. This can o...
SystemC is a modeling language built as an extension of C++. Its growing popularity and the increasing complexity of designs have motivated research efforts aimed at the verification of SystemC models using assertion-based verification (ABV), where the designer asserts properties that capture the design intent in a formal language such as PSL or SVA. The model then can be verified against the p...
The use of multiple monitors is becoming popular but it creates problems for pointer movement, window management, and control of applications. We suggest combining the standard input devices of keyboard and mouse with attentive user interface techniques. A user’s work with conventional input devices will naturally be based around a focal region, but that focus can be rapidly transferred in resp...
merican Medical Technologists (AMT) is somewhat unique among laboratory organizations in that it serves the dual roles of a certifying body and a professional membership association that provides its members an important benefit in the form of legislative monitoring and advocacy. AMT enjoys an excellent member-retention rate, especially in its MT and MLT membership categories — a testament that...
The growing use of embedded computers for both military and commercial applications has in~reased the imp~rtance of reliability in c?~puter .design. A g~neric technique called computer monitoring IS explored for ItS fault tolerant capabIlItIes, wIth emphaSIS on transient fault detection. The success of a particular monitor (the program flow monitor) is established through experimentation and is...
This paper presents a hardware based approach to embedded systems security. Usage of on-chip monitors is proposed for identifying attacks on embedded systems by tracking the operation of the system. Two types of monitors: a processing monitor and thermal monitor are presented with their detailed operation and results. The effectiveness of this security system can be enhanced by correlating info...
Although varanid lizards have achieved parity with mammals in many parts of the world, they exploit very different metabolic strategies and sensory mechanisms, and are properly regarded as convergent on the lifestyle of small predatory mammals. In parts of island southeast Asia and in Australia small monitors appear to fill ecological niches occupied by cats, mustelids and viverrids in other pa...
In this paper, we consider the runtime monitoring of norms with imperfect monitors. A monitor is imperfect for a norm if it has insufficient observational capabilities to determine if a given execution trace of a multi-agent system complies with or violates the norm. One approach to the problem of imperfect monitors is to enhance the observational capabilities of the normative organisation. How...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید