Results 21 to 30 of about 788,129 (97)

Algorithmization for calculating the security assessment of AIS operating systems of internal affairs bodies, developed on the basis of an analysis of security requirements GOST R ISO/IEC 15408 and possible threats

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2023
Objective. The article provides a generalized algorithmization of the processes necessary for developing software for assessing the security of operating systems of automated information systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov   +3 more
doaj   +1 more source

CFFS: A Persistent Memory File System for Contiguous File Allocation With Fine-Grained Metadata

open access: yesIEEE Access, 2022
Extensive research on persistent memory (PM)-aware file systems has led to the development of numerous methods for improving read/write throughput. In particular, accessing or modifying file contents in a similar manner to the memory operations through ...
Jen-Kuang Liu, Sheng-De Wang
doaj   +1 more source

Usability Analysis of a Novel Biometric Authentication Approach for Android-Based Mobile Devices

open access: yesJournal of Telecommunications and Information Technology, 2014
Mobile devices are widely replacing the standard personal computers thanks to their small size and userfriendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising.
Vincenzo Conti   +3 more
doaj   +1 more source

Linux Scheduler Improvement for Time Demanding Network Applications, Running on Communication Platform Systems

open access: yesJournal of Telecommunications and Information Technology, 2023
Communication platform systems as, e.g., advanced telecommunication computing architecture (ATCA) standard blades located in standardized chassis, provides high level communication services between system peripherals.
Marcin Hasse, Krzysztof Nowicki
doaj   +1 more source

Secure deployment strategy of virtual machines based on operating system diversity

open access: yes网络与信息安全学报, 2017
The resource-sharing model for cloud computing raises many security issues,such as co-resident of virtual machines,while greatly improving resource utilization.In particular,when a user adopts a single operating system,an attacker can steal privacy and ...
Miao ZHANG   +5 more
doaj   +3 more sources

Performance evaluation of windows virtual machines on a Linux host

open access: yesAutomatika, 2020
Virtualization has experienced a dramatic expansion recently and today is ubiquitous in modern IT industry since it provides numerous benefits to companies and individual users.
Josip Balen   +2 more
doaj   +1 more source

Optimized operation of regional reserve forces in a changing future security environment

open access: yes선진국방연구, 2021
The Republic of Korea Reserve Forces (ROKRF), established in 1968, continue to function through continuous changes such as improving laws and systems and optimizing organizations while complying with social and policy changes.
Seungbong Yang
doaj   +1 more source

Migration of tools and methodologies for performance prediction and efficient HPC on cloud environments: results and conclusion

open access: yesJournal of Computer Science and Technology, 2018
Progress in the parallel programming field has allowed scientific applications to be developed with more complexity and accuracy. However, such precision requires greater computational power in order to be executed.
Ronal Muresano   +3 more
doaj  

State and evaluation of information and communication technologies development in agricultural enterprises in the Czech Republic

open access: yesPlant, Soil and Environment, 2010
The paper presents selected information on the newest results of a wide investigation of the state of information and communication technologies development in agricultural production enterprises in the Czech Republic.
J. Vaněk   +3 more
doaj   +1 more source

Methodology for predicting the energy consumption of SPMD application on virtualized environments

open access: yesJournal of Computer Science and Technology, 2018
Over the last decade, the computing clusters have been updated in order to satisfy the increasing demand of greater computational power for running applications.
Javier Balladini   +4 more
doaj  

Home - About - Disclaimer - Privacy