Results 91 to 100 of about 5,262 (215)
A Survey of the Security Analysis of Embedded Devices. [PDF]
Zhou X, Wang P, Zhou L, Xun P, Lu K.
europepmc +1 more source
Epsim: A Scalable and Parallel Marssx86 Simulator With Exploiting Epoch-Based Execution
In general, a detailed modeling and evaluation of computer architectures make a cycle-accurate simulator necessary. As the architectures become increasingly complex for parallel, cloud, and neural computing, nowadays, the complexity of the simulator ...
Minseong Kim +4 more
doaj +1 more source
Vanguard: A Cache-Level Sensitive File Integrity Monitoring System in Virtual Machine Environment
Sensitive files in computer systems such as executable programs, configuration, and authorization information have a great importance of their own, in terms of both confidentiality and functionality.
Bin Shi, Bo Li, Lei Cui, Liu Ouyang
doaj +1 more source
IM-Dedup: An Image Management System Based on Deduplication Applied in DWSNs
In distributed wireless sensor networks (DWSNs), the data gathered by sink is always massive and consumes a lot of resources. It is suitable for cloud computing platform to apply service in data processing system.
Jilin Zhang +6 more
doaj +1 more source
The metabolomics workbench file status website: a metadata repository promoting FAIR principles of metabolomics data. [PDF]
Powell CD, Moseley HNB.
europepmc +1 more source
About Detection of Code Reuse Attacks
When exploiting software vulnerabilities such as buffer overflows, code reuse techniques are often used today. Such attacks allow you to bypass the protection against the execution of code in the stack, which is implemented at the software and hardware ...
Yury V. Kosolapov
doaj +1 more source
HPC cloud system design and implementation
There is pronounced interest to cloud computing in the scientific community. However, current cloud computing offerings are rarely suitable for highperformance computing, in large part due to an overhead level of underlying virtualization components. The
A. O. Kudryavtsev +8 more
doaj
Dynamic Translation Optimization Method Based on Static Pre-Translation
Binary translation technology is an effective method to solve the problem of software cross-platform transplantation, especially for software porting without source code.
Jun Wang +5 more
doaj +1 more source
A Novel 6G Conversational Orchestration Framework for Enhancing Performance and Resource Utilization in Autonomous Vehicle Networks. [PDF]
Shahzadi S, Chaudhry NR, Iqbal M.
europepmc +1 more source
The presented work is a result of extended research and analysis on timing methods precision, their efficiency in different virtual environments and the impact of timing precision on the performance of high-speed networks applications.
Veronika Kirova +6 more
doaj +1 more source

