Search results for "Rating system"

showing 9 items of 139 documents

Hypervisor-assisted Atomic Memory Acquisition in Modern Systems

2019

Reliable memory acquisition is essential to forensic analysis of a cyber-crime. Various methods of memory acquisition have been proposed, ranging from tools based on a dedicated hardware to software only solutions. Recently, a hypervisor-based method for memory acquisition was proposed (Qi et al., 2017; Martignoni et al., 2010). This method obtains a reliable (atomic) memory image of a running system. The method achieves this by making all memory pages non-writable until they are copied to the memory image, thus preventing uncontrolled modification of these pages. Unfortunately, the proposed method has two deficiencies: (1) the method does not support multiprocessing and (2) the method does…

integrity of a memory snapshotreliabilityvirtualisointiComputer scienceforensic soundnessHypervisormuistit (tietotekniikka)computer.software_genrevirtualizationatomicitymemory forensicsmemory acquisitionOperating systemMemory acquisitionlive forensicstietoturvacomputerProceedings of the 5th International Conference on Information Systems Security and Privacy
researchProduct

Chaos and its Degradation-Promoting-Based Control in an Antithetic Integral Feedback Circuit

2022

This letter deals with a novel variant of antithetic integral feedback controller (AIFC) motifs which can feature robust perfect adaptation, a pervasive (desired) ability in natural (synthetic) biomolecular circuits, when coupled with a wide class of process networks to be regulated. Using the separation of timescales in the proposed kind of AIFC, here we find a reducedorder controller that captures the governing slow part of the original solutions under suitable assumptions. Inspired by R(ossler systems, we then make use of such a simpler controller to show that the antithetic circuit can exhibit chaotic behaviors with strange attractors, where the bifurcation from a homeostatic state to c…

kaaosteoriaControl and OptimizationoscillatorsComputer sciencechaosControl (management)elektroniset piiritbiological system modelingprocess controloskillaattoritCHAOS (operating system)säätöteoriaControl and Systems EngineeringControl theoryintegrated circuit modelingmallit (mallintaminen)matemaattiset mallitmathematical modelsDegradation (telecommunications)degradation
researchProduct

A methodological framework based on a DANP model for evaluating the software quality in terms of usability: a preliminary investigation on mobile ope…

2020

Evaluation of the software usability as concerns software alternatives represents a typical Multi- Criteria Decision-Analysis (MCDA) problem. Such a kind of problem can be successfully faced via structured models and approaches which validity have been widely shown in literature. In this work, a methodological framework based on a MCDA model integrating the DEMATEL method along with the ANP technique is proposed and explained with more detail to address the relevant issue of the software usability evaluation. The applicability of the considered DEMATEL-ANP (DANP) based model in the under analysis contest is demonstrated via a preliminary investigation, where the usability of the two major M…

lcsh:HF5691-5716Computer sciencebusiness.industryMobile operating systemSoftware usabilitylcsh:QA299.6-433lcsh:Business mathematics. Commercial arithmetic. Including tables etc.General Decision SciencesSoftware qualityUsabilityDEMATELlcsh:AnalysisMulti-criteria decision-analysisMultiple-criteria decision analysisSoftware qualityMobile operating systemSoftwarebusinessSoftware engineeringSettore ING-IND/16 - Tecnologie E Sistemi Di LavorazioneANP
researchProduct

Change and Control Paradoxes in Mobile Infrastructure Innovation: The Android and iOS Mobile Operating Systems Cases

2012

The advent of the smart phone as a highly complex technology has been accompanied by mobile operating systems (OS), large communities of developers, diverse content providers, and increasingly complex networks, jointly forming digital infrastructures. The multi-faceted and relational character of such digital infrastructures raises issues around how change and control can be conceptualized and understood. We discuss how change and control are paradoxically related in digital infrastructures and how they affect the evolution of such infrastructures. We examine these paradoxes by examining the change in, and competition between, two mobile operating systems: Apple's iOS and Google's Android a…

liiketoimintamallitta113iOSkäyttöjärjestelmätbusiness.industryComputer scienceMobile computingBusiness modelcomputer.software_genremobiililaitteetAndroidOperating systemMobile searchinfrastruktuuritMobile telephonyUser interfaceAndroid (operating system)businesscomputermatkapuhelimet
researchProduct

A Framework to Facilitate Wireless Sensor Network Application Development

2013

Elektroniskā versija nesatur pielikumus

operating systemsdomēnspecifiskās valodasoperētājsistēmasdomain-specific languagesDatorzinātneInformācijas tehnoloģija un telekomunikācijasbezvadu sensoru tīkliwireless sensor networks
researchProduct

Page replacement in operating system memory management

2007

operating systemskäyttöjärjestelmätsivunkorvauspage replacementalgoritmitmuistinhallintamemory managementalgorithms
researchProduct

Hypervisor-Based White Listing of Executables

2019

We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed

operating systemsmicroprogrammingdatabasesvirtualisointiComputer Networks and CommunicationsComputer science0211 other engineering and technologiesListing (computer)02 engineering and technologycomputer.software_genre020204 information systemsMicrocode0202 electrical engineering electronic engineering information engineeringCode (cryptography)Overhead (computing)virtual machine monitorstietoturvaElectrical and Electronic Engineeringimage segmentation021110 strategic defence & security studieskäyttöjärjestelmätLinuxHypervisorcomputer.file_formatmonitoringOperating systemohjelmointiExecutableLawcomputerIEEE Security & Privacy
researchProduct

Detecting Kernel Vulnerabilities During the Development Phase

2015

Testing is one of the major problems in Linux kernel development cycle. Security analysis and ensuring no new vulnerabilities has been introduced is one of the toughest issues of testing. Kernel developers attempt to find as many security issues as possible before merging with the mainline branch. Failure to detect vulnerabilities will result in vulnerable kernel shipped by distribution and vulnerable systems. The kernel developers can choose between several industrial and open source tools to assist in the development process and shorten the development cycle. (Though not as many as user space developers. Kernel tools are limited and rare compared to user space tools) Some of these tools a…

procfssysfsbusiness.industryComputer scienceLinux kernelKernel virtual address spacecomputer.software_genreKernel (statistics)User spaceOperating systemHybrid kernelSoftware engineeringbusinesscomputerSecure coding2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
researchProduct

Scheduling under the network of temporo-spatial proximity relationships

2017

We discuss and introduce to the schedulingeld a novel, qualitative optimization model - scheduling under the network of temporo-spatial proximity relationships.We introduce a half perimeter proximity measure as an objective of scheduling.We present and evaluate an incremental Sequence Pair neighborhood evaluation algorithm, applicable to both scheduling and rectangle packing problems in VLSI industry. In this paper, we discuss and introduce to the scheduling field a novel optimization objective - half perimeter proximity measure in scheduling under the network of temporo-spatial proximity relationships. The presented approach enables to qualitatively express various reasons of scheduling ce…

proximity relationshipsMathematical optimizationGeneral Computer Sciencerectangle packing problemEvaluation algorithm0102 computer and information sciences02 engineering and technologyIntegrated circuitManagement Science and Operations Research01 natural scienceslaw.inventionScheduling (computing)lawApproximation error0202 electrical engineering electronic engineering information engineeringschedulingComputer Science::Operating SystemsMathematicsVery-large-scale integrationProximity measureneighborhood evaluation010201 computation theory & mathematicsModeling and Simulation020201 artificial intelligence & image processingsequence pairRectangle packingComputers & Operations Research
researchProduct