Results 91 to 100 of about 5,262 (215)

A Survey of the Security Analysis of Embedded Devices. [PDF]

open access: yesSensors (Basel), 2023
Zhou X, Wang P, Zhou L, Xun P, Lu K.
europepmc   +1 more source

Epsim: A Scalable and Parallel Marssx86 Simulator With Exploiting Epoch-Based Execution

open access: yesIEEE Access, 2019
In general, a detailed modeling and evaluation of computer architectures make a cycle-accurate simulator necessary. As the architectures become increasingly complex for parallel, cloud, and neural computing, nowadays, the complexity of the simulator ...
Minseong Kim   +4 more
doaj   +1 more source

Vanguard: A Cache-Level Sensitive File Integrity Monitoring System in Virtual Machine Environment

open access: yesIEEE Access, 2018
Sensitive files in computer systems such as executable programs, configuration, and authorization information have a great importance of their own, in terms of both confidentiality and functionality.
Bin Shi, Bo Li, Lei Cui, Liu Ouyang
doaj   +1 more source

IM-Dedup: An Image Management System Based on Deduplication Applied in DWSNs

open access: yesInternational Journal of Distributed Sensor Networks, 2013
In distributed wireless sensor networks (DWSNs), the data gathered by sink is always massive and consumes a lot of resources. It is suitable for cloud computing platform to apply service in data processing system.
Jilin Zhang   +6 more
doaj   +1 more source

About Detection of Code Reuse Attacks

open access: yesМоделирование и анализ информационных систем, 2019
When exploiting software vulnerabilities such as buffer overflows, code reuse techniques are often used today. Such attacks allow you to bypass the protection against the execution of code in the stack, which is implemented at the software and hardware ...
Yury V. Kosolapov
doaj   +1 more source

HPC cloud system design and implementation

open access: yesТруды Института системного программирования РАН, 2018
There is pronounced interest to cloud computing in the scientific community. However, current cloud computing offerings are rarely suitable for highperformance computing, in large part due to an overhead level of underlying virtualization components. The
A. O. Kudryavtsev   +8 more
doaj  

Dynamic Translation Optimization Method Based on Static Pre-Translation

open access: yesIEEE Access, 2019
Binary translation technology is an effective method to solve the problem of software cross-platform transplantation, especially for software porting without source code.
Jun Wang   +5 more
doaj   +1 more source

Impact of Modern Virtualization Methods on Timing Precision and Performance of High-Speed Applications

open access: yesFuture Internet, 2019
The presented work is a result of extended research and analysis on timing methods precision, their efficiency in different virtual environments and the impact of timing precision on the performance of high-speed networks applications.
Veronika Kirova   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy