نتایج جستجو برای: protection time

تعداد نتایج: 2045832  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده منابع طبیعی 1386

چکیده ندارد.

Journal: :ACM Transactions on Privacy and Security 2019

Journal: :American Journal of Public Health 2018

Journal: :Journal of Paediatrics and Child Health 2020

2000
Cliff Mercer Ragunathan Rajkumar Jim Zelenka

Real-time systems manipulate data types with inherent timing constraints. Priority-based scheduling is a popular approach to build hard real-time systems, when the timing requirements, supported run-time configurations, and task sets are known a priori. Future real-time systems would need to support these hard real-time constraints but in addition (a) provide friendly userinterfaces with audio ...

Journal: :Journal of accident & emergency medicine 1999
M F Nicol A Harris

The authors reply The letter from Gupta and Moalypour further illustrates that carotid artery dissection is not as uncommon as had been thought. The range of symptoms recognised as being due to the condition and its diagnosis will no doubt increase as doctors become aware of it and imaging techniques and access to them improve. At present we are still learning the true incidence and the natural...

2006
Jordi Nin Vicenç Torra

Privacy is becoming a pervasive issue, as nowadays information is gathered by all kind of information systems. In this paper we introduce a method for database protection in the case that the data under consideration is expressed in terms of time series. We propose the use of microaggregation for this purpose and extend standard microaggregation so that it works for this kind of data.

1994
Clifford W. Mercer Stefan Savage Hideyuki Tokuda

Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing scheduling algorithms of general purpose operating systems. Our approach is to provide the predictability of real-time systems while retaining the flexibility of a timesharing system. We designed a processor capacity reservation mechanism that isolates programs from the timing and executio...

2007
Guy Laden Paula Ta-Shma Eitan Yaffe Michael Factor Shachar Fienblit

Continuous Data Protection (CDP) is a recent storage technology which enables reverting the state of the storage to previous points in time. We propose four alternative architectures for supporting CDP in a storage controller, and compare them analytically with respect to both write performance and space usage overheads. We describe exactly how factors such as the degree of protection granulari...

1990
Josep Domingo-Ferrer

A new method is featured which solves the sofhvare integrity problem by properly coding rather than enciphering. Adopting the lengthy and expensive solution which consists of having the whole program signedlencrypted by an authority would require fiil decryption and secure storage for the whole program before execution, whereas one signed instruction, pipe-lined decoding-executing, and secure r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید