This is TikiWiki v1.9.8.3 -Sirius- © 2002–2007 by the Tiki community Sat 21 of Dec, 2024 [18:36 UTC]
Menu

Category D.4 OPERATING SYSTEMS

Browse in:
All Wiki pages Image galleries Images File galleries Blogs Trackers Items Surveys Articles

search category: deep:

Hide subcategories objects

..
 

Objects (33)

D.4.3 File Systems Management Article A SURVEY OF MATHEMATICAL AND INFORMATIONAL FOUNDATIONS OF THE BIGARM ACCESS ... Abstract: The BigArM is an access method for storing and accessing Big Data. It is under development. In this survey we present its mathematical and informational foundations as well as its requirem 
D.4.3 File Systems Management Article ADVANCE OF THE ACCESS METHODS Abstract: The goal of this paper is to outline the advance of the access methods in the last ten years as well as to make review of all available in the accessible bibliography methods. Keywords:  
D.4.6 Security and Protection Article ANALYSIS OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS Abstract: In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of info 
D.4.6 Security and Protection Article ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ... Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to and within it, is made. Main techniques for accomplishing an attack to virtual enviro 
D.4.6 Security and Protection Article ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ENVIRONMENT Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to and within it, is made. Main techniques for accomplishing an attack to virtual enviro 
D.4.6 Security and Protection Article APPLICATION OF METHODS OF MULTI-CRITERIA EVALUATION IN CHOOSING A METHOD ... Abstract: In this paper is proposed a model for researching the capability to influence, by selected methods’ groups of compression, to the co-efficient of information security of selected objects� 
D.4.8 Performance Article APPLICATION OF SOME CYBERNETIC MODELS IN BUILDING INDIVIDUAL EDUCATIONAL ... Abstract. The individual educational trajectory (IET) is a medium-term didactic complex that provides optimal opportunities for developing the creative potential of the learner by taking into account 
D.4.1 Process Management Article BUILDING OF THE VIRTUAL ENVIRONMENT FOR GRID APPLICATIONS Abstract: The article considers the problems of configuring grid resources to perform computational tasks in the grid environment. The technology of automated configuration environment to perform tas 
D.4.6 Security and Protection Article CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES ... Abstract: This paper deals with the security problems of DRM protected e-learning content. After a short review of the main DRM systems and methods used in e-learning, an examination is made of parti 
D.4.6 Security and Protection Article CORRELATION-BASED PASSWORD GENERATION FROM FINGERPRINTS Abstract: In this paper, a methodology for reliable password generation from fingerprints is developed. In contrast to traditional biometric systems, proposed algorithm does not authenticate user by  
D.4.6 Security and Protection Article EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS ... Abstract: The principal methods of compression and different types of non-encrypted objects are described. An analysis is made of the results obtained from examinations of the speed of compression fo 
D.4.3 File Systems Management Article GENERAL STRUCTURE OF COLLECT/REPORT PARADIGM FOR STORING AND ACCESSING BIG DATA Abstract: The general structure of Collect/Report Paradigm (CRP) is outlined in this paper. CRP is a new approach for storing and accessing large amounts of data. Main advantages of CRP are: (1) col 
D.4.1 Process Management Article GRID WORKFLOW DESIGN AND MANAGEMENT SYSTEM Abstract: Despite the increased development and use of grid-technologies for solving large-scale computational tasks in various scientific fields, the problem of complexity and efficiency of using dis 
D.4.m Miscellaneous Article HTML VALIDATION THROUGH EXTENDED VALIDATION SCHEMA Abstract: The paper presents extensible software architecture and a prototype and an implementation of a highly configurable system for HTML validation. It is based on validation rules defined in an  
D.4.6 Security and Protection Article IMPROVING OF EXISTING PERMISSION SYSTEM IN ANDROID OS Abstract: Smartphones for last five-ten years had become ubiquitous. Despite the fact, that these small devices are very widespread around the world - security are still being understood. As a result 
D.4.3 File Systems Management Article INTRODUCTION TO STORING GRAPHS BY NL-ADDRESSING Abstract: This paper introduces an approach to storing graphs based on the Natural Language Addressing in multidimensional numbered information spaces. A sample graph is analyzed to find its proper L 
D.4.3 File Systems Management Article INTRODUCTION TO STORING GRAPHS BY NL-ADDRESSING Abstract: This paper introduces an approach to storing graphs based on the Natural Language Addressing in multidimensional numbered information spaces. A sample graph is analyzed to find its proper N 
D.4.3 File Systems Management Article INTRODUCTION TO THE NATURAL LANGUAGE ADDRESSING Abstract: Natural Language Addressing (NLA) is a possibility to access information using natural language words or phrases as direct addresses of the information in the computer memory. For this purpo 
D.4.6 Security and Protection Article INVESTIGATING THE RELATIONS OF ATTACKS, METHODS AND OBJECTS ... Abstract: Possibilities for investigations of 43 varieties of file formats (objects), joined in 10 groups; 89 information attacks, joined in 33 groups and 73 methods of compression, joined in 10 grou 
D.4.6 Security and Protection Article INVESTIGATION ON COMPRESSION METHODS USED AS A PROTECTION INSTRUMENT ... Abstract: This report examines important issues related to different ways to influence the information security of file objects, subjected to information attacks by the methods of compression. Accordi 
D.4.1 Process Management Article MODELLING AND CONTROL OF COMPUTATIONAL PROCESSES USING MAX-PLUS ALGEBRA Abstract: In this paper we propose a modelling technique for the control of computational processes. The Petri Net model, particularly a Timed Event Graph (TEG) can be used for analyzing. The propose 
D.4 OPERATING SYSTEMS Article PASSIVE STEGANALYSIS OF MULTIDOMAIN EMBEDDING METHODS Abstract: The paper is devoted to analysis of effectiveness the usage of modern statistical model of digital image for revealing the stego images with data, embedded in transformation domain of cover 
D.4.5 Reliability Article Program Invariants Generation over Polynomial Ring using Iterative Methods. Abstract: A solution for program polynomial invariant generation problem is presented. An iteration upper approximation method that was successfully applied on free algebras in this paper was adopted  
D.4.6 Security and Protection Article RESEARCH OF THE INFLUENCE OF METHODS OF COMPRESSION ON ... Abstract: In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-eff 

Page: 1/2  [next]
1   2  
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.25 secs ]   [ Memory usage: 9.12MB ]   [ GZIP Disabled ]   [ Server load: 0.37 ]