نتایج جستجو برای: the tempest

تعداد نتایج: 16052748  

2013
Liu Jinming Mao Jian Zhang Jiemin Li Yongmei

Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As result all equipments handling confidential information do need TEMPEST security testing. This paper attemp...

2006
Tudor Marian Mahesh Balakrishnan Ken Birman Robbert van Renesse

We describe Tempest, a platform for assisting web services developers. Tempest allows Java programmers to create services that scale across clusters of computing nodes, adapting automatically as load surges or drops, components fail or recover, and client-generated loads vary. The system automates tasks such as replica placement, update dissemination, consistency checking, and repair when incon...

1995
Mark D. Hill James R. Larus David A. Wood

This paper describes Tempest, a collection of mechanisms for communication and synchronization in parallel programs. With these mechanisms, authors of compilers, libraries, and application programs can exploit—across a wide range of hardware platforms—the best of shared memory, message passing, and hybrid combinations of the two. Because Tempest provides mechanisms, not policies, programmers ca...

2003
Paul TOMPKINS Anthony STENTZ William WHITTAKER

We present TEMPEST, an autonomous, energy-cognizant planner for long-range rover navigation. Its purpose is to plan sequences of actions that avoid large-scale obstacles, balance energy expenses against available resources, and satisfy operational constraints while attaining a distant goal. An algorithm called Incremental Search Engine (ISE) enables TEMPEST to search over high-dimensional space...

Journal: :Kinema: A Journal for Film and Audiovisual Media 2015

2017
Simone Caroti

In his paper, "Science Fiction, Forbidden Planet, and Shakespeare's The Tempest," Simone Caroti illustrates the way in which Cyril Hume and Fred Wilcox's 1956 science fiction movie Forbidden Planet -whose plot is inspired by Shakespeare's Tempest -reconfigures in Shakespeare's play. Caroti begins by defining the genre of science fiction and explaining its attraction for modern audiences. Follow...

1998
J. E. van der Merwe S. Rooney

|The Tempest framework allows the dynamic introduction and modiication of network services at two levels of granularity. First, the switchlet and associated virtual network concepts enable the safe introduction of alternative control architectures into an operational network. The timescales over which such new control architectures can be introduced might vary from, for example, a video confer-...

1998
S. Rooney J. E. van der Merwe

Most research in network programmability has stressed the exibility engendered by increasing the ability of users to conngure network elements for their own purposes, without addressing the larger issues of how such advanced control systems can coexist both with each other and with more conventional ones. The Tempest framework presented here extends beyond the provision of simple network progra...

2009
Wolter Pieters

In the Dutch e-voting debate, the crucial issue leading to the abandonment of all electronic voting machines was compromising radiation, or tempest. Other countries, however, do not seem to be bothered by this risk. In this paper, we use actor-network theory to analyse the socio-technical origins of the Dutch tempest issue in e-voting, and its consequences for e-voting beyond the Netherlands. W...

Journal: :Critical Times 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید