Non-Intrusive Persistence with a Backend NVM Controller

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a new type-ii fuzzy logic based controller for non-linear dynamical systems with application to 3-psp parallel robot

abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...

15 صفحه اول

A Protégé 4 Backend for Native OWL Persistence

We present a persistence layer for native storage and manipulation of OWL ontologies on top of the OWL API and an associated integration of the first version of this OWL persistence layer into the Protégé ontology engineering environment. This allows for an efficient handling of large ontologies within the Protégé 4 environment even if they do not fit in main memory. The approach is based on a ...

متن کامل

Intrusive and non-intrusive watermarking

“Can we watermark without perturbing an image?” We present the salient results of the investigation carried out to find an answer to this question.

متن کامل

Non-Intrusive Identity Management

This paper presents a novel architecture for digital identity management. The proposed architecture is highly secure and scales seamlessly across organizational boundaries, while at the same time protecting the privacy interests of individuals and organizations. To achieve these properties, the architecture heavily relies on Digital Credentials, a cryptographic authentication technology specifi...

متن کامل

Non-intrusive authentication

Available security solutions often are not widely used because the associated secure applications are awkward to use or they lack functionality when compared to standard insecure tools. To avoid this dicothomy, we developed a non-intrusive (or external) clientserver authentication framework which requires no modi cation to both the clients and the servers. In this way, full featured clients can...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Computer Architecture Letters

سال: 2016

ISSN: 1556-6056

DOI: 10.1109/lca.2015.2443105