نتایج جستجو برای: booting

تعداد نتایج: 1102  

Journal: :Expert Syst. Appl. 2014
Gang Wang Jian Ma Shanlin Yang

With the recent financial crisis and European debt crisis, corporate bankruptcy prediction has become an increasingly important issue for financial institutions. Many statistical and intelligent methods have been proposed, however, there is no overall best method has been used in predicting corporate bankruptcy. Recent studies suggest ensemble learning methods may have potential applicability i...

2007
T. Mark Ellison

Prague, June 2007. c ©2007 Association for Computational Linguistics Bayesian Identi ation of Cognates and Corresponden es T. Mark Ellison Linguisti s, University of Western Australia, and Analith Ltd mark markellison.net Abstra t This paper presents a Bayesian approa h to omparing languages: identifying ognates and the regular orresponden es that ompose them. A simple model of language is exte...

2001
Joan Dyer Ronald Perez Reiner Sailer Leendert van Doorn

In this paper we explore how secure coprocessors can be used to secure client devices, especially mobile clients such as notebook computers. The goal is to protect data on the mobile client in case of theft, and to adapt the client's protection to the working environment --such as the Intranet or Internet-without relying completely on the integrity of the client. We show how physically secure c...

2006
M. Johnston

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract We define Dynamic Host Configuration Protocol (DHCP) options being used by Preboot eXecution Environment (PXE) and Extensible Firmware Interface (EFI) clients to uniquely identify booting client machines and their p...

2013
Jun Zhao Virgil D. Gligor Adrian Perrig James Newsome

Many commodity operating systems and applications become infested with malicious software over time, primarily due to exploits that take advantage of software flaws and operator errors. In this paper, we present the salient features of a system design which allows remote-device authentication by a verifier, reaching malware-free system states, and trusted application booting in the presence of ...

2014
Stephen Weis

Defending computers from unauthorized physical access, malicious hardware devices, or other low-level attacks has proven extremely challenging. The risks from these attacks are exacerbated in cloud-computing environments, where users lack physical control over servers executing their workloads. This paper reviews several firmware and physical attacks against x86 platforms, including bootkits, ”...

A. Almodares, F. Eraghizadeh R. Taheri

In this study, the effects of concentration and application time of ethephon on growth parameters; stem height, stem diameter, biomass, carbohydrate content; sucrose content, invert sugar, brix value, and juice volume of two sweet sorghum cultivars were determined. Three ethephon application time (8 leaves, booting, and flowering) and five ethephon concentrations (0, 200, 400, 600, and 800 ppm)...

2009

We present Midas, an economical FPGA-based architecture simulator that allows rapid early design-space exploration of manycore systems. Midas models target-system timing and functionality separately, and it employs hostmultithreading for an efficient FPGA implementation. It is a high-throughput, cycle-accurate full-system simulator, capable of booting real operating systems. The Midas prototype...

2012
Soumya Sunny

This paper realizes an embedded web server, which enables data acquisition and status monitoring with the help of any standard web browser. User can monitor and control remote temperature and video information The platform used is Linux and ARM 9 processor. Biggest advantage of this web server is embedding a PC based web server into the ARM platform without losing any of its features. It consis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید