Results 21 to 30 of about 366,295 (267)

Design and implementation of partial dynamically reconfigurable FPGA process scheduling

open access: yesDianzi Jishu Yingyong, 2023
In view of the diverse edge computing requirements of the 6G era, reconfigurable technology based on FPGAs can achieve lower latency and provide diversified services.
Qian Hongwen   +5 more
doaj   +1 more source

Linux kernel compaction through cold code swapping [PDF]

open access: yes, 2009
There is a growing trend to use general-purpose operating systems like Linux in embedded systems. Previous research focused on using compaction and specialization techniques to adapt a general-purpose OS to the memory-constrained environment, presented ...
A. Milanova   +13 more
core   +2 more sources

Explainable human‐in‐the‐loop healthcare image information quality assessment and selection

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Smart healthcare applications cannot be separated from healthcare data analysis and the interactive interpretability between data and model. A human‐in‐the‐loop active learning approach is introduced to reduce the cost of healthcare data labelling by evaluating the information quality of unlabelled medical data and then screening the high ...
Yang Li, Sezai Ercisli
wiley   +1 more source

Testing of Linux File System Drivers

open access: yesТруды Института системного программирования РАН, 2018
The paper investigates issues of Linux file system driver testing. Linux file system drivers are implemented as kernel modules, which works in the same address space as kernel core. For that reason, the driver should be very reliable.
A. V. Tsyvarev, V. A. Martirosyan
doaj   +1 more source

The method of intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement

open access: yesIET Networks, EarlyView., 2022
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley   +1 more source

Linux Driver Verification

open access: yesТруды Института системного программирования РАН, 2018
Linux driver verification is a large application area for software verification methods, in particular, for functional, safety, and security verification. Linux driver software is industrial production code — IT infrastructures rely on its stability, and
D. Beyer, A. K. Petrenko
doaj   +1 more source

Big Data Technology Fusion Back Propagation Neural Network in Product Innovation Design Method

open access: yesIET Networks, Accepted Article., 2022
This research uses big data technology to combine the process of product innovation design method, which has certain significance for the formation of intelligent and systematic product innovation design method. Meanwhile, while predicting the results of all products innovative design methods, it can improve the product's predictive innovative design ...
Ren Li, Qiang Zeng
wiley   +1 more source

Analysis of Linux OS security tools for packet filtering and processing

open access: yesMokslas: Lietuvos Ateitis, 2021
Open-source software and its components are widely used in various products, solutions, and applications, even in closed-source. Majority of them are made on Linux or Unix based systems. Netfilter framework is one of the examples.
Dmitrij Melkov, Šarūnas Paulikas
doaj   +1 more source

Adobe Flash as a medium for online experimentation: a test of reaction time measurement capabilities [PDF]

open access: yes, 2007
Adobe Flash can be used to run complex psychological experiments over the Web. We examined the reliability of using Flash to measure reaction times (RTs) using a simple binary-choice task implemented both in Flash and in a Linux-based system known to ...
N. Stewart   +9 more
core   +1 more source

Technologies and Applications for Decentralized Identity in Healthcare

open access: yesBlockchain in Healthcare Today
Key discussion points • Decentralized identity in healthcare • State of the market • Key technologies • Deployments and real world use cases Hear from those on the front lines implementing this technology successfully for healthcare ...
Daniela Barbosa   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy