Search results for "Rating system"
showing 9 items of 139 documents
Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
2019
Reliable memory acquisition is essential to forensic analysis of a cyber-crime. Various methods of memory acquisition have been proposed, ranging from tools based on a dedicated hardware to software only solutions. Recently, a hypervisor-based method for memory acquisition was proposed (Qi et al., 2017; Martignoni et al., 2010). This method obtains a reliable (atomic) memory image of a running system. The method achieves this by making all memory pages non-writable until they are copied to the memory image, thus preventing uncontrolled modification of these pages. Unfortunately, the proposed method has two deficiencies: (1) the method does not support multiprocessing and (2) the method does…
Chaos and its Degradation-Promoting-Based Control in an Antithetic Integral Feedback Circuit
2022
This letter deals with a novel variant of antithetic integral feedback controller (AIFC) motifs which can feature robust perfect adaptation, a pervasive (desired) ability in natural (synthetic) biomolecular circuits, when coupled with a wide class of process networks to be regulated. Using the separation of timescales in the proposed kind of AIFC, here we find a reducedorder controller that captures the governing slow part of the original solutions under suitable assumptions. Inspired by R(ossler systems, we then make use of such a simpler controller to show that the antithetic circuit can exhibit chaotic behaviors with strange attractors, where the bifurcation from a homeostatic state to c…
A methodological framework based on a DANP model for evaluating the software quality in terms of usability: a preliminary investigation on mobile ope…
2020
Evaluation of the software usability as concerns software alternatives represents a typical Multi- Criteria Decision-Analysis (MCDA) problem. Such a kind of problem can be successfully faced via structured models and approaches which validity have been widely shown in literature. In this work, a methodological framework based on a MCDA model integrating the DEMATEL method along with the ANP technique is proposed and explained with more detail to address the relevant issue of the software usability evaluation. The applicability of the considered DEMATEL-ANP (DANP) based model in the under analysis contest is demonstrated via a preliminary investigation, where the usability of the two major M…
Change and Control Paradoxes in Mobile Infrastructure Innovation: The Android and iOS Mobile Operating Systems Cases
2012
The advent of the smart phone as a highly complex technology has been accompanied by mobile operating systems (OS), large communities of developers, diverse content providers, and increasingly complex networks, jointly forming digital infrastructures. The multi-faceted and relational character of such digital infrastructures raises issues around how change and control can be conceptualized and understood. We discuss how change and control are paradoxically related in digital infrastructures and how they affect the evolution of such infrastructures. We examine these paradoxes by examining the change in, and competition between, two mobile operating systems: Apple's iOS and Google's Android a…
A Framework to Facilitate Wireless Sensor Network Application Development
2013
Elektroniskā versija nesatur pielikumus
Page replacement in operating system memory management
2007
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed
Detecting Kernel Vulnerabilities During the Development Phase
2015
Testing is one of the major problems in Linux kernel development cycle. Security analysis and ensuring no new vulnerabilities has been introduced is one of the toughest issues of testing. Kernel developers attempt to find as many security issues as possible before merging with the mainline branch. Failure to detect vulnerabilities will result in vulnerable kernel shipped by distribution and vulnerable systems. The kernel developers can choose between several industrial and open source tools to assist in the development process and shorten the development cycle. (Though not as many as user space developers. Kernel tools are limited and rare compared to user space tools) Some of these tools a…
Scheduling under the network of temporo-spatial proximity relationships
2017
We discuss and introduce to the schedulingeld a novel, qualitative optimization model - scheduling under the network of temporo-spatial proximity relationships.We introduce a half perimeter proximity measure as an objective of scheduling.We present and evaluate an incremental Sequence Pair neighborhood evaluation algorithm, applicable to both scheduling and rectangle packing problems in VLSI industry. In this paper, we discuss and introduce to the scheduling field a novel optimization objective - half perimeter proximity measure in scheduling under the network of temporo-spatial proximity relationships. The presented approach enables to qualitatively express various reasons of scheduling ce…