Results 21 to 30 of about 4,676,074 (371)

Analysis of operating system diversity for intrusion tolerance [PDF]

open access: yes, 2013
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity.
Abd-El-Malek   +34 more
core   +1 more source

ALGORITHM OF USER’S PERSONAL DATA PROTECTION AGAINST DATA LEAKS IN WINDOWS 10 OS

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2019
In the European Union, in the first half of 2018, the General Data Protection Regulation came into force, which established the new rules for processing users’ personal data for IT companies.
Olexander Zadreyko   +2 more
doaj   +1 more source

Using the Nanvix Operating System in Undergraduate Operating System Courses [PDF]

open access: yes2017 VII Brazilian Symposium on Computing Systems Engineering (SBESC), 2017
Operating Systems (OSs) have an important position in the Computer Science curriculum. When students face this subject, they study core concepts, mechanisms and strategies that apply to several fields. To support practical lectures in an OSs course, instructors may adopt an OS on which students can work, exercising their knowledge and enhancing their ...
Penna, Pedro Henrique   +4 more
openaire   +5 more sources

Resource and Process Management With a Decision Model Based on Fuzzy Logic

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2023
The allocation of the resources to be shared in the context of a distributed processing system needs to be coordinated through the mutual exclusion mechanism, which will decide the order in which the shared resources will be allocated to those processes ...
J. T. Fornerón Martínez   +2 more
doaj   +1 more source

Prioritization and selection of operating system by employing geometric aggregation operators based on Aczel-Alsina t-norm and t-conorm in the environment of bipolar complex fuzzy set

open access: yesAIMS Mathematics, 2023
Aczel-Alsina t-norm and t-conorm are great substitutes for sum and product and recently various scholars developed notions based on the Aczel-Alsina t-norm and t-conorm.
Tahir Mahmood   +3 more
doaj   +1 more source

You and I are Past Our Dancing Days [PDF]

open access: yes, 1994
Operating systems have grown in size and functionality. Today's many flavours of Unix provide a multi-user environment with protection, address spaces, and attempts to allocate resources fairly to users competing for them, They provide processes and ...
Mullender, Sape J.
core   +3 more sources

Wireless Sensor Network Operating System Design Rules Based on Real-World Deployment Survey

open access: yesJournal of Sensor and Actuator Networks, 2013
Wireless sensor networks (WSNs) have been a widely researched field since the beginning of the 21st century. The field is already maturing, and TinyOS has established itself as the de facto standard WSN Operating System (OS).
Leo Selavo   +3 more
doaj   +1 more source

Implementasi Metode National Institute of Justice (NIJ) Pada Fitur TRIM SOLID STATE DRIVE (SSD) Dengan Objek Eksperimental Sistem Operasi Windows, Linux dan Macintosh

open access: yesIT Journal Research and Development, 2020
Solid State Drive (SSD) merupakan solusi terkni untuk mempercepat pemrosesan data dari berbagai komputer desktop yang bersifat multiplatform. Fitur TRIM yang ada pada SSD berguna untuk menghilangkan garbage data yang dihapus permanen oleh user, dimana ...
Rizdqi Akbar Ramadhan, Desti Mualfah
doaj   +1 more source

SMS-Phishing on Android Smart Phone [PDF]

open access: yesمجلة التربية والعلم, 2018
Recently, mobile become the most significant device that used almost daily, and one of the most important service that offered by mobile operators is the SMS that used between mobiles, none of the mobile OS is contain a service that encrypt the send SMS ...
MAHMOD S. MAHMOD
doaj   +1 more source

History states of systems and operators [PDF]

open access: yesPhysical Review A, 2018
We discuss some fundamental properties of discrete system-time history states. Such states arise for a quantum reference clock of finite dimension and lead to a unitary evolution of system states when satisfying a static discrete Wheeler-DeWitt-type equation.
Boette, Alan Pablo, Rossignoli, Raúl
openaire   +6 more sources

Home - About - Disclaimer - Privacy