نتایج جستجو برای: computer operating procedure
تعداد نتایج: 1282898 فیلتر نتایج به سال:
چکیده ندارد.
Buffer overflow vulnerabilities in the memory stack continue to pose serious threats to network and computer security. By exploiting these vulnerabilities, a malicious party can strategically overwrite the return address of a procedure call, obtain control of a system, and subsequently launch more virulent attacks. Software countermeasures for such intrusions entail modifications to application...
Inevitably, reading is one of the requirements to be undergone. To improve the performance and quality, someone needs to have something new every day. It will suggest you to have more inspirations, then. However, the needs of inspirations will make you searching for some sources. Even from the other people experience, internet, and many books. Books and internet are the recommended media to hel...
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In these courses, students learn how to design, implement, analyze, test, and operate a system or a network to achieve security. Pedagogical research has shown that effective laboratory exercises are critically important to...
The Pilot operating system provides a single-user, single-language environment for higher level software on a powerful personal computer. Its features include virtual memory, a large "fiat" file system, streams, network communication facilities, and concurrent programming support. Pilot thus provides rather more powerful facilities than are normally associated with personal computers. The exact...
The Virtual Operating Room (VOR) is an operating room training environment capable of supporting team training for surgical procedures. One of the challenges of creating such a team training environment is assembling a suitable team of participants for a training session. In the VOR, simulated agents may be substituted for actual participants. This provides the ability to conduct training sessi...
This study analyses the location of patterns of brain activity in the signal space while a human subject is trained to operate a brain-computer interface. This evaluation plays an important role in the understanding of the underlying system, and it gives valuable information about the translation algorithms. The relative position and morphology of the patterns in a training session, and from on...
This paper represents how your PC and Laptop can be controlled from with your T.V remote with the help of Frontend Application. It means the conventional PC mouse operations controlled by using T.V Remote. It turns your Remote into a wireless mouse and don’t need any surface. It requires Forntend application on your computer. This is an implementation of RC5-remote reception on an 8051 micro co...
Recently Trusted Platform Module (TPM) is emerged as a new solution to secure computers and other systems. It is a small microchip that enables encryption and stores authentication information in computer motherboard. This paper presents the initiative of trust computing and an overview of TPM along with architecture and security features. We also discuss the applications and future of TPM. In ...
Part I is a general description of a simple operatirg system, which runs in a virtual machine (implemented on ~ Teal machine by an interpreter). 056 copes wi th only one user at a tiJlle, and is not a multiprogramming system: many major problews associated with large operating systems have therefore been avoided or considerably simplified. It nevertheless has several features of in:erest. inclu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید