Results 21 to 30 of about 895,674 (297)

The $SOH$ operator system

open access: yesJournal of Operator Theory, 2016
19 ...
Vern I. Paulsen, Wai Hin Ng
openaire   +3 more sources

MIROS: A Hybrid Real-Time Energy-Efficient Operating System for the Resource-Constrained Wireless Sensor Nodes

open access: yesSensors, 2014
Operating system (OS) technology is significant for the proliferation of the wireless sensor network (WSN). With an outstanding OS; the constrained WSN resources (processor; memory and energy) can be utilized efficiently.
Xing Liu   +4 more
doaj   +1 more source

Methods for Lowering the Power Consumption of OS-Based Adaptive Deep Brain Stimulation Controllers

open access: yesSensors, 2021
The identification of a new generation of adaptive strategies for deep brain stimulation (DBS) will require the development of mixed hardware–software systems for testing and implementing such controllers clinically.
Roberto Rodriguez-Zurrunero   +2 more
doaj   +1 more source

A Framework for Detecting System Performance Anomalies Using Tracing Data Analysis

open access: yesEntropy, 2021
Advances in technology and computing power have led to the emergence of complex and large-scale software architectures in recent years. However, they are prone to performance anomalies due to various reasons, including software bugs, hardware failures ...
Iman Kohyarnejadfard   +3 more
doaj   +1 more source

Assessment of the moderating effects of Nigerian market environment on the relationship between management success determinants and SMEs’ performance [PDF]

open access: yesProblems and Perspectives in Management, 2020
A reported eighty-five percentage failure rate of SMEs in Nigeria before five years of operation was ascribed to a lack of knowledge of the market environment.
Olalekan Asikhia, Vannie Naidoo
doaj   +1 more source

Unveiling the Landscape of Operating System Vulnerabilities

open access: yesFuture Internet, 2023
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and
Manish Bhurtel, Danda B. Rawat
doaj   +1 more source

Operation System Vulnerabilities Analysis Based on Code Clone Detection

open access: yesJisuanji kexue yu tansuo, 2021
Software vulnerability detection based on code clone detection technology is an important direction in the static analysis of software vulnerability. At present, the existing software vulnerability detection tools have deficie-ncies in the vulnerability ...
WANG Zhe, REN Yi, ZHOU Kai, GUAN Jianbo, TAN Yusong
doaj   +1 more source

State and evaluation of information and communication technologies development in agricultural enterprises in the Czech Republic

open access: yesPlant, Soil and Environment, 2010
The paper presents selected information on the newest results of a wide investigation of the state of information and communication technologies development in agricultural production enterprises in the Czech Republic.
J. Vaněk   +3 more
doaj   +1 more source

Performance evaluation of windows virtual machines on a Linux host

open access: yesAutomatika, 2020
Virtualization has experienced a dramatic expansion recently and today is ubiquitous in modern IT industry since it provides numerous benefits to companies and individual users.
Josip Balen   +2 more
doaj   +1 more source

Process Management in IoT Operating Systems: Cross-Influence between Processing and Communication Tasks in End-Devices

open access: yesSensors, 2019
The emergence and spread of Internet of Things (IoT) technologies along with the edge computing paradigm has led to an increase in the computational load on sensor end-devices.
Roberto Rodriguez-Zurrunero   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy