نتایج جستجو برای: reboot

تعداد نتایج: 306  

2008
John McLean

The notion of a consensus, although it means little in science, is often used in support of the claim of man-made warming. Even quite recently we've seen reports about more than 400 people, mainly highly qualified scientists who "reject the consensus". But what is the history of claims of a consensus and what exactly is the consensus to which these claims refer, and even more importantly, do th...

2017
Martin Trope

Introduction Studies a ssessing the d iametr ic dimensions of apical anatomy repeatedly demonstrate that the bucco-lingual diameter is greater than the mesio-distal diameter— canals are predominantly ovoid throughout, not round (Figs. 1a and 1b). The technical flaw most inherent—the use of a round file of any design to clean an ovoid canal configuration —manifests as the failure to debride a su...

2008
K. Miyazaki

Two new nuclear equations of state (EOSs) are proposed and are applied to neutron star (NS). They predict the incompressibilitiesK0 = 179MeV and 230MeV, respectively. The density dependencies of nuclear symmetry energies are consistent with the recent analyses of heavy-ion reactions. We can reproduce the recently observed super-massive NS of MG > 2:5M , the mass-radius relation of EXO 0748-676 ...

2008
P. S. Negi

The necessary and sufficient condition for dynamical stability is worked out for the sequences of relativistic star models corresponding to the well defined and causal values of adiabatic sound speed, √ (dP/dE)0 = v0, at the centre. On the basis of these conditions, we show that the mass-radius (M −R) relation corresponding to the MIT bag models of strange quark matter (SQM) and the models obta...

2014
Stephen Weis

Defending computers from unauthorized physical access, malicious hardware devices, or other low-level attacks has proven extremely challenging. The risks from these attacks are exacerbated in cloud-computing environments, where users lack physical control over servers executing their workloads. This paper reviews several firmware and physical attacks against x86 platforms, including bootkits, ”...

1998
C. Motch

We report the discovery of a transient jet in the supersoft X-ray source RX J0925.7-4758. The jet was observed in the Hα line during a single night in June 1997 and had disappeared one day later. RX J0925.7-4758 is the third supersoft source to exhibit collimated outflows. The peak jet velocity of 5,200 km s−1, strongly argues in favour of a white dwarf in RX J0925.7-4758. Simple modelling of t...

2007
Andrew Baumann Jonathan Appavoo Robert W. Wisniewski Dilma Da Silva Orran Krieger Gernot Heiser

Patches to modern operating systems, including bug fixes and security updates, and the reboots and downtime they require, cause tremendous problems for system users and administrators. Dynamic update allows an operating system to be patched without the need for a reboot or other service interruption. We have taken the approach of building dynamic update functionality directly into an existing o...

2006
Eric R. Fossum

This paper reports on the investigation of charge-transfer noise and lag in CMOS image sensors. Noise and lag are analyzed for buried-photodiode CMOS active-pixel-sensor (APS) devices using a simple Monte-Carlo technique. Since the main mechanism of charge-transfer noise involves carrier emission over a barrier, the results are applicable to the soft reset of photodiode-type CMOS APS devices, a...

2014
Abhishek Kaushik Sudhanshu Naithani

DRAM is an important memory of a computer. Microprocessor loads the data requested by the user into DRAM before processing the data. Hence, DRAM contains important information in a computer. Recently, researchers discovered that DRAM is vulnerable to attack that is called Cold boot attack. DRAM contents can be recovered even after the computer has been powered off for several minutes. The infor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید