نتایج جستجو برای: booting
تعداد نتایج: 1102 فیلتر نتایج به سال:
Flooded rice fields are an important source of the greenhouse gas CH(4). Possible carbon sources for CH(4) and CO(2) production in rice fields are soil organic matter (SOM), root organic carbon (ROC) and rice straw (RS), but partitioning of the flux between the different carbon sources is difficult. We conducted greenhouse experiments using soil microcosms planted with rice. The soil was amende...
This technical report introduces some software packages for partial SVD computation, including optimized PROPACK, modified PROPACK for computing singular values above a threshold and the corresponding singular vectors, and block Lanczos with warm start (BLWS). The current version is preliminary. The details will be enriched soon.
NetBSD has a cross build infrastructure which allows cross-building of an entire NetBSD release including bootable distribution media. The build process does not require root privileges or writable source directories. The build process works on many POSIX compatible operating systems. This paper explains the changes made to NetBSD to enable this build process, enumerates benefits of the work, a...
Packet size optimization is an important issue in energy constrained wireless sensor networks. As larger size of packets may cause data bit corruption, wireless sensor networks will suffer from higher frequency of re-transmission. As compared to a larger packet size, small size packets are more efficient but creating too short packet size might cause problems, like higher overhead, due to per p...
The ability to securely run arbitrary untrusted code on a wide variety of execution platforms is a challenging problem in the Grid community. One way to achieve this is to run the code inside a contained, isolated environment, namely a “sandbox”. Virtual machines provide a natural solution to the security and resource management issues that arise in sandboxing. We explore different designs for ...
We present an affine-invariant random walk for drawing uniform random samples from a convex body K Ă Rn for which the maximum volume inscribed ellipsoid, known as John’s ellipsoid, may be computed. We consider a polytope P “ x P Rn ˇ̌ Ax ď 1 ( where A P R as a special case. Our algorithm makes steps using uniform sampling from the John’s ellipsoid of the symmetrization of K at the current point....
We demonstrate attacks on the boot ROMs of the Nintendo 3DS in order to exfiltrate secret information from normally protected areas of memory and gain persistent early code execution on devices which have not previously been compromised. The attack utilizes flaws in the RSA signature verification implementation of one of the boot ROMs in order to overflow ASN.1 length fields and cause invalid f...
When we use a mobile device which runs Android, we usually look for the basic features such as call, texting, gaming, internet browsing, camera and music. However Android devices can be made more powerful and its power can be utilized in a larger scale once it has been rooted. Keywords-Root, Rooting, Android, Recovery, Bootloader,
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید