Results 101 to 110 of about 5,262 (215)

Поддержка многопоточности симулятора QEMU

open access: yesВестник Новгородского государственного университета им. Ярослава Мудрого, 2013
Описана проблема эмуляции многопоточных приложений в эмуляторе QEMU и ее причины, а также проблема их детерминированного воспроизведения при использовании журнала событий. Сделан обзор существующих вариантов реализации многопроцессорного воспроизведения приложений, выделены их недостатки.
openaire   +1 more source

Structure-Enhanced Prompt Learning for Graph-Based Code Vulnerability Detection

open access: yesApplied Sciences
Recent advances in prompt learning have opened new avenues for enhancing natural language understanding in domain-specific tasks, including code vulnerability detection.
Wei Chang, Chunyang Ye, Hui Zhou
doaj   +1 more source

Hybrid IoT Cyber Range. [PDF]

open access: yesSensors (Basel), 2023
Balto KE   +3 more
europepmc   +1 more source

Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks

open access: yesApplied Sciences
(1) Background: Side-channel attacks (SCAs) exploit unintended information leakage to compromise cryptographic security. In cyber-physical systems (CPSs), embedded systems are inherently constrained by limited resources, restricting the implementation of
Seungun Park   +5 more
doaj   +1 more source

CoMeT: Configurable Tagged Memory Extension. [PDF]

open access: yesSensors (Basel), 2021
Lee J, Pratama D, Kim M, Kim H, Kwon D.
europepmc   +1 more source

VXA: A Virtual Architecture for Durable Compressed Archives

open access: yes, 2005
Data compression algorithms change frequently, and obsolete decoders do not always run on new hardware and operating systems, threatening the long-term usability of content archived using those algorithms.
Ford, Bryan
core   +3 more sources

Home - About - Disclaimer - Privacy