نتایج جستجو برای: integrity approach
تعداد نتایج: 1352060 فیلتر نتایج به سال:
Undoubtedly, public spaces can be considered as an essential factor, which could contribute to urban arrangement, create and maintain a strong local center and enhance the quality of superior environment and the sense of citizenship. Moreover, integrity has always been the most basic structural qualities and one of the key principles of cities. Integrated urban spaces exhibit the integrated str...
There are many improvement methodologies and techniques available to improve plant reliability and availability, including such techniques as Reliability Centred Maintenance, PM Optimisation, Weibull analysis and others. However all of these techniques have significant limitations when it comes to dealing with high consequence, low probability events – those events that have potentially catastr...
Earlier this year the University of Huddersfield's Institute of Skin Integrity and Infection Prevention in association with the Journal of Wound Care (JWC) held the first International Skin Integrity and Infection Prevention Conference. The 2-day event consisted of a mix of keynotes, symposia and short presentations from key opinion leaders and post graduate research students. Here Professor Ka...
A number of systems employ dynamic taint analysis to detect overwrite attacks in commodity software. These systems are based on the premise that low-integrity inputs should not control values such as function pointers and return addresses. Unfortunately, there are several programming constructs that can cause false positives and false negatives in these systems, which are currently handled by m...
Chen Jinli*, Xue Yali, Liu Xingang Aircraft Airworthiness CertificationDepartment, Civil Aviation Management Institute of China (CAMIC) No. 3 East Road Huajiadi, Chaoyang District, Beijing, China, 100102, Ph./Fax: +8610-58250631/58250630 State Key Lab of Power Systems, Thermal Engineering Department, Tsinghua University No. 30Shuangqing Road, Haidian District, Beijing, China, 100084, Ph./Fax: +...
and possibly error-prone or malicious users are to coexist on the same computer system. In this paper, we show that a hierarchically structured operating system, such as produced by a virtual machine system, that combines a virtual machine monitor with several independent operating systems (V M M ~ O S) , provides substantially better software security than a conventional two-level multiprogram...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید