نتایج جستجو برای: reboot
تعداد نتایج: 306 فیلتر نتایج به سال:
Solving polynomial systems with noise over F2 is a fundamental problem in computer science, especially in cryptanalysis. ISBS is a new method for solving this problem based on the idea of incrementally solving the noisy polynomial systems and backtracking all the possible noises. It had better performance than other methods in solving the Cold Boot Key recovery problem. In this paper, some furt...
This paper presents Vassal, a system that enables applications to dynamically load and unload CPU scheduling policies into the operating system kernel, allowing multiple policies to be in effect simultaneously. With Vassal, applications can utilize scheduling algorithms tailored to their specific needs and generalpurpose operating systems can support a wide variety of special-purpose scheduling...
The fact that systems fail should come as no surprise to anymore who has ever developed or worked on a system. A failure reduces the availability of the system and hence the productivity of entities using this system. To increase system availability, several approaches have been developed; these approaches range from simple techniques such as restarting the entire system, to complex algorithms ...
In this paper, we describe a novel proactive recovery scheme based on service migration for long-running Byzantine fault tolerant systems. Proactive recovery is an essential method for ensuring long term reliability of fault tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window. This ...
A robust architecture against network intrusions plays a main role for information security and service reliability. An intruder that obtains an unauthorized access to a remote system could read restricted information or hide this access for future and eventually more dangerous actions. Temporary intrusions can become permanent (i.e., resistant to reboots) if malicious code is installed in a sy...
Abstract Introduction The role of beta blockers (BB) post–myocardial infarction (MI) in patients without reduced ejection fraction the era invasive management is controversial results from observational studies have led to opposite results. Methods REBOOT an independent multinational pragmatic, controlled, randomized, open–label, with blinded endpoint adjudication clinical trial. study testing ...
To meet the challenge of integrating new methods and technologies into the Internet security framework, it is useful to hide low-level authentication mechanisms from application programmers, system administrators, and users, replacing them with abstractions at a higher level. The Pluggable Authentication Method approach popular in Linux, Solaris, and CDE offers one such abstraction. To implemen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید