Results 21 to 30 of about 4,219,504 (325)
Assessment of the moderating effects of Nigerian market environment on the relationship between management success determinants and SMEs’ performance [PDF]
A reported eighty-five percentage failure rate of SMEs in Nigeria before five years of operation was ascribed to a lack of knowledge of the market environment.
Olalekan Asikhia, Vannie Naidoo
doaj +1 more source
Unveiling the Landscape of Operating System Vulnerabilities
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and
Manish Bhurtel, Danda B. Rawat
doaj +1 more source
Quality of service in distributed multimedia systems [PDF]
The Unix operating system made a vital contribution to information technology by introducing the notion of composing complicated applications out of simple ones by means of pipes and shell scripts.
Mullender, S.J., Sijben, P.
core +2 more sources
Research on cloud native based distributed IoT operating system architecture
Complex application development, various types of IoT devices, diverse network technology and different types of IoT edge are the major problems of IoT.The novel concept and architecture of the cloud native based distributed IoT operating system were ...
Nan CHEN +4 more
doaj
The paper presents selected information on the newest results of a wide investigation of the state of information and communication technologies development in agricultural production enterprises in the Czech Republic.
J. Vaněk +3 more
doaj +1 more source
Operation System Vulnerabilities Analysis Based on Code Clone Detection
Software vulnerability detection based on code clone detection technology is an important direction in the static analysis of software vulnerability. At present, the existing software vulnerability detection tools have deficie-ncies in the vulnerability ...
WANG Zhe, REN Yi, ZHOU Kai, GUAN Jianbo, TAN Yusong
doaj +1 more source
The emergence and spread of Internet of Things (IoT) technologies along with the edge computing paradigm has led to an increase in the computational load on sensor end-devices.
Roberto Rodriguez-Zurrunero +3 more
doaj +1 more source
MGOS: A library for molecular geometry and its operating system [PDF]
The geometry of atomic arrangement underpins the structural understanding of molecules in many fields. However, no general framework of mathematical/computational theory for the geometry of atomic arrangement exists.
Bhak, Jong +10 more
core +2 more sources
Tamper-proof Operating System [PDF]
Due to the sensibility of biometric data, security in biometric devices has to be considered. One of the ways to protect privacy is to include a tamper-proof operating system. This O.S. would not allow direct access to hardware resources of the device, neither to temporary nor permanent data.This O.S.
openaire +5 more sources
Operator systems connect operator algebra, free semialgebraic geometry and quantum information theory. In this work we generalize operator systems and many of their theorems. While positive semidefinite matrices form the underlying structure of operator systems, our work shows that these can be promoted to far more general structures.
Gemma De les Coves +2 more
openaire +2 more sources

