نتایج جستجو برای: protection systems
تعداد نتایج: 1344171 فیلتر نتایج به سال:
With the rapid growth of the information age, open distributed systems have become increasingly popular. The need for protection and security in a distributed.distributed systems and the security issues associated with those systems. Across multiple devices is to protect the data in case of disk failure through.Systems: Security and Protection-access controls, authenti. Person at CMU suggests t...
We describe a concept to employ Trusted Computing technology to secure Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted platform module (TPM) into the set-top-box or residential home gateway. Various deployment scenarios exhibit possibilities of charging co-operation with mobile network operators (MNO), or other
With this distributed generation (DG) in distribution systems, its function generally tends to be changed. These effects leads to effects on distribution systems protection. One way to reduce the effects of distributed generation protection system of distribution systems is re-coordination of protective devices. To prevent the high cost, system configuration should be modified to reduce the DG ...
Real-time systems manipulate data types with inherent timing constraints. Priority-based scheduling is a popular approach to build hard real-time systems, when the timing requirements, supported run-time configurations, and task sets are known a priori. Future real-time systems would need to support these hard real-time constraints but in addition (a) provide friendly userinterfaces with audio ...
We apply speciication and veriication techniques based on the timed I/O automaton model of Lynch and Vaandrager to a case study in the area of automated transit. The case study models and veriies selected safety properties for automated Personal Rapid Transit (PRT) systems such as PRT 2000 TM , a system currently being developed at Raytheon. Due to their safety critical nature, PRT 2000 TM and ...
We study the incentives that agents have to invest in costly protection against cascading failures in networked systems. Applications include vaccination, computer security, and airport security. Agents are connected through a network and can fail either intrinsically or as a result of the failure of a subset of their neighbors. We characterize the equilibrium based on an agent’s failure probab...
Adequate protection of digital copies of multimedia content – both audio and video – is a prerequisite to the distribution of this content over networks. Until recently digital audio and video content has been protected by its size: it is difficult to distribute and store without compression. Modern compression algorithms allow substantial bitrate reduction while maintaining highfidelity reprod...
Commercial and government organizations are deploying database management system (DBMS) technology as the backbone for their electronic commerce and Internet-based computing applications. As one would expect, these organizations require high performance, scaleable, fault-tolerant systems that can efficiently and securely process transactions from thousands of concurrent, distributed clients. As...
Adequate protection of digital copies of multimedia content - both audio and video - is a prerequisite to the distribution of this content over networks. Until recently digital audio and video content has been protected by its size: it is difficult to distribute and store without compression. Modern compression algorithms allow substantial bitrate reduction while maintaining high-fidelity repro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید