نتایج جستجو برای: protection time
تعداد نتایج: 2045832 فیلتر نتایج به سال:
چکیده ندارد.
Real-time systems manipulate data types with inherent timing constraints. Priority-based scheduling is a popular approach to build hard real-time systems, when the timing requirements, supported run-time configurations, and task sets are known a priori. Future real-time systems would need to support these hard real-time constraints but in addition (a) provide friendly userinterfaces with audio ...
The authors reply The letter from Gupta and Moalypour further illustrates that carotid artery dissection is not as uncommon as had been thought. The range of symptoms recognised as being due to the condition and its diagnosis will no doubt increase as doctors become aware of it and imaging techniques and access to them improve. At present we are still learning the true incidence and the natural...
Privacy is becoming a pervasive issue, as nowadays information is gathered by all kind of information systems. In this paper we introduce a method for database protection in the case that the data under consideration is expressed in terms of time series. We propose the use of microaggregation for this purpose and extend standard microaggregation so that it works for this kind of data.
Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing scheduling algorithms of general purpose operating systems. Our approach is to provide the predictability of real-time systems while retaining the flexibility of a timesharing system. We designed a processor capacity reservation mechanism that isolates programs from the timing and executio...
Continuous Data Protection (CDP) is a recent storage technology which enables reverting the state of the storage to previous points in time. We propose four alternative architectures for supporting CDP in a storage controller, and compare them analytically with respect to both write performance and space usage overheads. We describe exactly how factors such as the degree of protection granulari...
A new method is featured which solves the sofhvare integrity problem by properly coding rather than enciphering. Adopting the lengthy and expensive solution which consists of having the whole program signedlencrypted by an authority would require fiil decryption and secure storage for the whole program before execution, whereas one signed instruction, pipe-lined decoding-executing, and secure r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید