Results 1 to 10 of about 364,629 (281)
Kernel Code Integrity Protection at the Physical Address Level on RISC-V
An operating system kernel has the highest privilege in most computer systems, making its code integrity critical to the entire system’s security.
Seon Ha +3 more
doaj +1 more source
In August 2011, Linux entered its third decade. Ten years before, Chou et al. published a study of faults found by applying a static analyzer to Linux versions 1.0 through 2.4.1. A major result of their work was that the drivers directory contained up to
Calvès, Christophe +5 more
core +5 more sources
The article provides an overview of the web traffic filtering system using the Linux-based Squid software package. The system allows you to limit users on the Internet and collect statistics without interfering with the user’s computer, including the web
P. V. Pevnev
doaj +1 more source
Linux XIA: an interoperable meta network architecture to crowdsource the future Internet [PDF]
With the growing number of proposed clean-slate redesigns of the Internet, the need for a medium that enables all stakeholders to participate in the realization, evaluation, and selection of these designs is increasing.
Byers, John +2 more
core +3 more sources
Analisi dell'approccio marketing open source di ...
PACE, STEFANO, LUCIANO FRATOCCHI
+6 more sources
Studying Computer Networking Technologies in School: Problems and Suggestions
Computer networking technologies are an important part of the information exchange process. In the existing basic textbooks of computer science in grades 7-11, insufficient attention is paid to this topic.
Pavel Romasevich +2 more
doaj +1 more source
Unikernels: the next stage of Linux’s dominance [PDF]
Unikernels have demonstrated enormous advantages over Linux in many important domains, causing some to propose that the days of Linux's dominance may be coming to an end.
Appavoo, Jonathan +8 more
core +1 more source
Digital Forensic on Secure Digital High Capacity using DFRWS Method
As evidenced in the trial, between 2015 and the second quarter of 2022, there were 54 cases involving secure digital high capacity (SDHC) storage hardware as evidenced in trials. In 2021 there will be an increase in cases involving SDHC.
Anton Yudhana, Imam Riadi, Budi Putra
doaj +1 more source
D-Link Comprehensive Training Solution for Networking Professionals
The paper is devoted to the description of the structure of educational resources of the D-Link company as a comprehensive training solution, including a portal for distance learning and certification, an electronic library, lecture courses ...
Philip Zakharov +3 more
doaj +1 more source
Design and implementation of partial dynamically reconfigurable FPGA process scheduling
In view of the diverse edge computing requirements of the 6G era, reconfigurable technology based on FPGAs can achieve lower latency and provide diversified services.
Qian Hongwen +5 more
doaj +1 more source

