نتایج جستجو برای: the tempest
تعداد نتایج: 16052748 فیلتر نتایج به سال:
Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As result all equipments handling confidential information do need TEMPEST security testing. This paper attemp...
We describe Tempest, a platform for assisting web services developers. Tempest allows Java programmers to create services that scale across clusters of computing nodes, adapting automatically as load surges or drops, components fail or recover, and client-generated loads vary. The system automates tasks such as replica placement, update dissemination, consistency checking, and repair when incon...
This paper describes Tempest, a collection of mechanisms for communication and synchronization in parallel programs. With these mechanisms, authors of compilers, libraries, and application programs can exploit—across a wide range of hardware platforms—the best of shared memory, message passing, and hybrid combinations of the two. Because Tempest provides mechanisms, not policies, programmers ca...
We present TEMPEST, an autonomous, energy-cognizant planner for long-range rover navigation. Its purpose is to plan sequences of actions that avoid large-scale obstacles, balance energy expenses against available resources, and satisfy operational constraints while attaining a distant goal. An algorithm called Incremental Search Engine (ISE) enables TEMPEST to search over high-dimensional space...
In his paper, "Science Fiction, Forbidden Planet, and Shakespeare's The Tempest," Simone Caroti illustrates the way in which Cyril Hume and Fred Wilcox's 1956 science fiction movie Forbidden Planet -whose plot is inspired by Shakespeare's Tempest -reconfigures in Shakespeare's play. Caroti begins by defining the genre of science fiction and explaining its attraction for modern audiences. Follow...
|The Tempest framework allows the dynamic introduction and modiication of network services at two levels of granularity. First, the switchlet and associated virtual network concepts enable the safe introduction of alternative control architectures into an operational network. The timescales over which such new control architectures can be introduced might vary from, for example, a video confer-...
Most research in network programmability has stressed the exibility engendered by increasing the ability of users to conngure network elements for their own purposes, without addressing the larger issues of how such advanced control systems can coexist both with each other and with more conventional ones. The Tempest framework presented here extends beyond the provision of simple network progra...
In the Dutch e-voting debate, the crucial issue leading to the abandonment of all electronic voting machines was compromising radiation, or tempest. Other countries, however, do not seem to be bothered by this risk. In this paper, we use actor-network theory to analyse the socio-technical origins of the Dutch tempest issue in e-voting, and its consequences for e-voting beyond the Netherlands. W...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید