Results 21 to 30 of about 788,129 (97)
Objective. The article provides a generalized algorithmization of the processes necessary for developing software for assessing the security of operating systems of automated information systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov+3 more
doaj +1 more source
CFFS: A Persistent Memory File System for Contiguous File Allocation With Fine-Grained Metadata
Extensive research on persistent memory (PM)-aware file systems has led to the development of numerous methods for improving read/write throughput. In particular, accessing or modifying file contents in a similar manner to the memory operations through ...
Jen-Kuang Liu, Sheng-De Wang
doaj +1 more source
Usability Analysis of a Novel Biometric Authentication Approach for Android-Based Mobile Devices
Mobile devices are widely replacing the standard personal computers thanks to their small size and userfriendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising.
Vincenzo Conti+3 more
doaj +1 more source
Communication platform systems as, e.g., advanced telecommunication computing architecture (ATCA) standard blades located in standardized chassis, provides high level communication services between system peripherals.
Marcin Hasse, Krzysztof Nowicki
doaj +1 more source
Secure deployment strategy of virtual machines based on operating system diversity
The resource-sharing model for cloud computing raises many security issues,such as co-resident of virtual machines,while greatly improving resource utilization.In particular,when a user adopts a single operating system,an attacker can steal privacy and ...
Miao ZHANG+5 more
doaj +3 more sources
Performance evaluation of windows virtual machines on a Linux host
Virtualization has experienced a dramatic expansion recently and today is ubiquitous in modern IT industry since it provides numerous benefits to companies and individual users.
Josip Balen+2 more
doaj +1 more source
Optimized operation of regional reserve forces in a changing future security environment
The Republic of Korea Reserve Forces (ROKRF), established in 1968, continue to function through continuous changes such as improving laws and systems and optimizing organizations while complying with social and policy changes.
Seungbong Yang
doaj +1 more source
Progress in the parallel programming field has allowed scientific applications to be developed with more complexity and accuracy. However, such precision requires greater computational power in order to be executed.
Ronal Muresano+3 more
doaj
The paper presents selected information on the newest results of a wide investigation of the state of information and communication technologies development in agricultural production enterprises in the Czech Republic.
J. Vaněk+3 more
doaj +1 more source
Methodology for predicting the energy consumption of SPMD application on virtualized environments
Over the last decade, the computing clusters have been updated in order to satisfy the increasing demand of greater computational power for running applications.
Javier Balladini+4 more
doaj