نتایج جستجو برای: booting
تعداد نتایج: 1102 فیلتر نتایج به سال:
A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted platform module. However, Dig-Force2 cannot be used for Windows Vista systems because the hooked API cannot monitor booting programs in user accounts...
This paper examines a few techniques in booting Asynchronous Transfer Mode (ATM) switches securely over an insecure network. Each of these techniques assume a diierent trust model. This work is carried out in the context of the Fairisle ATM switch environment. In this environment we are envisaging an open multi service network where ATM switches are booted with third party software, using a thi...
This paper examines a few techniques for booting Asynchronous Transfer Mode (ATM) switches securely over an insecure network. Each of these techniques assume a diierent trust model. This work is being carried out in the context of the Fairisle ATM switch environment. In this environment we are envisaging an open multi-service network where ATM switches are booted with third party software, poss...
ABSTRACT The objective of this study was to determine the effect of silicon (Si) and rice growth stages on tissue susceptibility to sheath blight (Rhizoctonia solani Kühn) under controlled conditions. Rice plants (cv. Rio Formoso) were grown in pots containing low-Si soil amended with Si at 0, 0.48, 0.96, 1.44, and 1.92 g pot(-1) and inoculated with R. solani at the following days after emergen...
Successive single day transfers of pot-grown wheat to high temperature (35/30°C day/night) replicated controlled environments, from the second node detectable to the milky-ripe growth stages, provides the strongest available evidence that the fertility of wheat can be highly vulnerable to heat stress during two discrete peak periods of susceptibility: early booting [decimal growth stage (GS) 41...
To exploit the genetic mechanism of cold tolerance in rice, cold tolerant near-isogenic lines (NILs) were developed by backcrossing Kunmingxiaobaigu (KMXBG), reported to be the most cold-tolerant variety at the booting stage, as donor, with the cold sensitive Japanese commercial japonica variety, Towada. Comparisons of cold tolerance-related traits between five BC(6)F(5) NILs and recurrent pare...
A rice introgression line, NIL-SS1, and its recurrent parent, Teqing, were used to investigate the influence of the introgression segment on plant growth. The current research showed NIL-SS1 had an increased flag leaf width, total leaf area, spikelet number per panicle and grain yield, but a decreased photosynthetic rate. The metabolite differences in NIL-SS1 and Teqing at different development...
Linux containers have recently gained more popularity as an operating system level virtualization approach for running multiple isolated OS distros on a control host or deploying large scale microservicebased applications in the cloud environment. The wide adoption of containers as an application deployment platform also attracts attackers’ attention. Since the system calls are the entry points...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید