Results 21 to 30 of about 895,674 (297)
Operating system (OS) technology is significant for the proliferation of the wireless sensor network (WSN). With an outstanding OS; the constrained WSN resources (processor; memory and energy) can be utilized efficiently.
Xing Liu+4 more
doaj +1 more source
Methods for Lowering the Power Consumption of OS-Based Adaptive Deep Brain Stimulation Controllers
The identification of a new generation of adaptive strategies for deep brain stimulation (DBS) will require the development of mixed hardware–software systems for testing and implementing such controllers clinically.
Roberto Rodriguez-Zurrunero+2 more
doaj +1 more source
A Framework for Detecting System Performance Anomalies Using Tracing Data Analysis
Advances in technology and computing power have led to the emergence of complex and large-scale software architectures in recent years. However, they are prone to performance anomalies due to various reasons, including software bugs, hardware failures ...
Iman Kohyarnejadfard+3 more
doaj +1 more source
Assessment of the moderating effects of Nigerian market environment on the relationship between management success determinants and SMEs’ performance [PDF]
A reported eighty-five percentage failure rate of SMEs in Nigeria before five years of operation was ascribed to a lack of knowledge of the market environment.
Olalekan Asikhia, Vannie Naidoo
doaj +1 more source
Unveiling the Landscape of Operating System Vulnerabilities
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and
Manish Bhurtel, Danda B. Rawat
doaj +1 more source
Operation System Vulnerabilities Analysis Based on Code Clone Detection
Software vulnerability detection based on code clone detection technology is an important direction in the static analysis of software vulnerability. At present, the existing software vulnerability detection tools have deficie-ncies in the vulnerability ...
WANG Zhe, REN Yi, ZHOU Kai, GUAN Jianbo, TAN Yusong
doaj +1 more source
The paper presents selected information on the newest results of a wide investigation of the state of information and communication technologies development in agricultural production enterprises in the Czech Republic.
J. Vaněk+3 more
doaj +1 more source
Performance evaluation of windows virtual machines on a Linux host
Virtualization has experienced a dramatic expansion recently and today is ubiquitous in modern IT industry since it provides numerous benefits to companies and individual users.
Josip Balen+2 more
doaj +1 more source
The emergence and spread of Internet of Things (IoT) technologies along with the edge computing paradigm has led to an increase in the computational load on sensor end-devices.
Roberto Rodriguez-Zurrunero+3 more
doaj +1 more source