Ring system

Results: 776



#Item
121Particle physics / Synchrotron radiation / Electron beam / Klystron / Storage ring / Insertion device / Microwave / Resonance / Synchrotron light source / Physics / Particle accelerators / Vacuum tubes

SESAME 8: RADIO FREQUENCY SYSTEM Chapter 8 RADIO FREQUENCY SYSTEM

Add to Reading List

Source URL: www.sesame.org.jo

Language: English - Date: 2013-08-31 07:39:36
122Microkernel / Kernel / Mach / Operating system / Sandbox / Ring / Mac OS X / Virtual machines / L4 microkernel family / Computer architecture / System software / Software

Faculty of Computer Science / Institute of Systems Architecture / Operating Systems Less is More A Secure Microkernel-based OS Adam Lackorzynski, Alexander Warg

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:31:01
123Computer security / Malware / Rootkit / Ring / Hypervisor / Operating system / SCADA / Hardware virtualization / Kernel / System software / Software / Virtual machines

Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:31:17
124Operating system kernels / Exokernel / Central processing unit / Kernel / Virtual machine / Microkernel / System call / Ring / Operating system / Computer architecture / System software / Computing

Exokernel: An Operating System Architecture for Application-Level Resource Management Dawson R. Engler, M. Frans Kaashoek, and James O’Toole Jr. M.I.T. Laboratory for Computer Science Cambridge, MA 02139, U.S.A engler,

Add to Reading List

Source URL: www.news.cs.nyu.edu

Language: English - Date: 2008-08-24 08:10:27
125Linux kernel / Monolithic kernels / Computer security / Malware / Rootkit / Kernel / Loadable kernel module / Hooking / Ring / System software / Software / Computer architecture

Countering Kernel Rootkits with Lightweight Hook Protection Zhi Wang Xuxian Jiang

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03
126Lie groups / Group theory / Ring theory / Euclidean geometry / Root system / Centralizer and normalizer / Representation theory / Abstract algebra / Lie algebras / Algebra

On the Functional Equations Satisfied by Eisenstein Series† Robert P. Langlands † Appeared as vol. 544 of Springer–Verlag Lecture Notes in Math., Springer–Verlag, Berlin–Heidelberg,

Add to Reading List

Source URL: www.sunsite.ubc.ca

Language: English - Date: 2001-05-12 20:14:44
127Virtual machines / Programming language implementation / Hyper-V / Kernel / Hypervisor / Ring / Rootkit / Xen / Memory management unit / System software / Software / Central processing unit

HIMA: A Hypervisor-Based Integrity Measurement Agent Ahmed M. Azab, Peng Ning, Emre C. Sezer North Carolina State University {amazab, pning, ecsezer}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
128Computer security / Access control / Identity management / Operating system / Kernel / Ring / Android / Google Chrome / Malware / Software / Computing / Cloud clients

This paper appears at the 33rd IEEE Symposium on Security and Privacy (OaklandUser-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems Franziska Roesner, Tadayoshi Kohno {franzi, yo

Add to Reading List

Source URL: www.franziroesner.com

Language: English - Date: 2012-03-08 13:27:49
129Computing platforms / Microkernel / Monolithic kernels / Kernel / QNX / Thread / Ring / Embedded system / Linux kernel / Computer architecture / Computing / L4 microkernel family

LP49: Embedded system OS based on L4 and Plan 9 Yoshihide Sato *1*2 Katsumi Maruyama *1 {satoh-yoshihide, maruyama}@nii.ac.jp *1 : National Institute of InformaticsHitotsubashi, Chiyoda-ku, Tokyo, Japan

Add to Reading List

Source URL: lsub.org

Language: English - Date: 2014-05-08 11:33:12
130Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
UPDATE