نتایج جستجو برای: reboot

تعداد نتایج: 306  

Journal: :IACR Cryptology ePrint Archive 2014
ZhenYu Huang Dongdai Lin

Solving polynomial systems with noise over F2 is a fundamental problem in computer science, especially in cryptanalysis. ISBS is a new method for solving this problem based on the idea of incrementally solving the noisy polynomial systems and backtracking all the possible noises. It had better performance than other methods in solving the Cold Boot Key recovery problem. In this paper, some furt...

1997
George M. Candea Michael B. Jones

This paper presents Vassal, a system that enables applications to dynamically load and unload CPU scheduling policies into the operating system kernel, allowing multiple policies to be in effect simultaneously. With Vassal, applications can utilize scheduling algorithms tailored to their specific needs and generalpurpose operating systems can support a wide variety of special-purpose scheduling...

2008
Theophilus A. Benson Steven Kappes

The fact that systems fail should come as no surprise to anymore who has ever developed or worked on a system. A failure reduces the availability of the system and hence the productivity of entities using this system. To increase system availability, several approaches have been developed; these approaches range from simple techniques such as restarting the entire system, to complex algorithms ...

Journal: :IET Software 2009
Wenbing Zhao

In this paper, we describe a novel proactive recovery scheme based on service migration for long-running Byzantine fault tolerant systems. Proactive recovery is an essential method for ensuring long term reliability of fault tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window. This ...

2002
Luigi Catuogno Ivan Visconti

A robust architecture against network intrusions plays a main role for information security and service reliability. An intruder that obtains an unauthorized access to a remote system could read restricted information or hide this access for future and eventually more dangerous actions. Temporary intrusions can become permanent (i.e., resistant to reboots) if malicious code is installed in a sy...

Journal: :European Heart Journal Supplements 2023

Abstract Introduction The role of beta blockers (BB) post–myocardial infarction (MI) in patients without reduced ejection fraction the era invasive management is controversial results from observational studies have led to opposite results. Methods REBOOT an independent multinational pragmatic, controlled, randomized, open–label, with blinded endpoint adjudication clinical trial. study testing ...

1997
Naomaru Itoi Peter Honeyman

To meet the challenge of integrating new methods and technologies into the Internet security framework, it is useful to hide low-level authentication mechanisms from application programmers, system administrators, and users, replacing them with abstractions at a higher level. The Pluggable Authentication Method approach popular in Linux, Solaris, and CDE offers one such abstraction. To implemen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید