نتایج جستجو برای: computer operating procedure

تعداد نتایج: 1282898  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده مهندسی برق و کامپیوتر 1388

چکیده ندارد.

2003
John P. McGregor David K. Karig Zhijie Shi Ruby B. Lee

Buffer overflow vulnerabilities in the memory stack continue to pose serious threats to network and computer security. By exploiting these vulnerabilities, a malicious party can strategically overwrite the return address of a procedure call, obtain control of a system, and subsequently launch more virulent attacks. Software countermeasures for such intrusions entail modifications to application...

1988
Laurie S. Keller

Inevitably, reading is one of the requirements to be undergone. To improve the performance and quality, someone needs to have something new every day. It will suggest you to have more inspirations, then. However, the needs of inspirations will make you searching for some sources. Even from the other people experience, internet, and many books. Books and internet are the recommended media to hel...

2003
Wenliang Du

To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In these courses, students learn how to design, implement, analyze, test, and operate a system or a network to achieve security. Pedagogical research has shown that effective laboratory exercises are critically important to...

2001
David D. Redell Yogen K. Dalal Thomas R. Horsley Hugh C. Lauer William C. Lynch Paul R. McJones Hal G. Murray Stephen C. Purcell

The Pilot operating system provides a single-user, single-language environment for higher level software on a powerful personal computer. Its features include virtual memory, a large "fiat" file system, streams, network communication facilities, and concurrent programming support. Pilot thus provides rather more powerful facilities than are normally associated with personal computers. The exact...

2009
Emre Baydogan Saurav Mazumdar

The Virtual Operating Room (VOR) is an operating room training environment capable of supporting team training for surgical procedures. One of the challenges of creating such a team training environment is assembling a suitable team of participants for a training session. In the VOR, simulated agents may be substituted for actual participants. This provides the ability to conduct training sessi...

2003
J. Mouriño S. Chiappa R. Jané J. del R. Millán

This study analyses the location of patterns of brain activity in the signal space while a human subject is trained to operate a brain-computer interface. This evaluation plays an important role in the understanding of the underlying system, and it gives valuable information about the translation algorithms. The relative position and morphology of the patterns in a training session, and from on...

2015
J.Umesh Rao Vishnuvardhan Reddy

This paper represents how your PC and Laptop can be controlled from with your T.V remote with the help of Frontend Application. It means the conventional PC mouse operations controlled by using T.V Remote. It turns your Remote into a wireless mouse and don’t need any surface. It requires Forntend application on your computer. This is an implementation of RC5-remote reception on an 8051 micro co...

2013
Hak J. Kim

Recently Trusted Platform Module (TPM) is emerged as a new solution to secure computers and other systems. It is a small microchip that enables encryption and stores authentication information in computer motherboard. This paper presents the initiative of trust computing and an overview of TPM along with architecture and security features. We also discuss the applications and future of TPM. In ...

2009
Joseph Stoy Christopher Strachey

Part I is a general description of a simple operatirg system, which runs in a virtual machine (implemented on ~ Teal machine by an interpreter). 056 copes wi th only one user at a tiJlle, and is not a multiprogramming system: many major problews associated with large operating systems have therefore been avoided or considerably simplified. It nevertheless has several features of in:erest. inclu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید