The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A variation of the suspend-resume technique eliminates the need to initialize the Linux kernel, and when combined with approaches to enhance external memory read speed and shrink the suspend image, can decrease Android OS boot time by up to 90 percent.
High-assurance embedded systems have very strict requirement in both design and analysis. This paper presents a trusted architecture named Hades to high-assurance system design for security and safety-critical embedded systems with MLS, which is based on the concept of separation. We define a rule that only authorized data can be transferred among partitions to absolutely guarantee the security and...
The principle of cluster analysis combined kernel methods with data description was researched firstly, based on this, the cluster analysis process combined kernel methods with data description and artificial immune system of real encoding was put forward. Then identify indexes of electricity customer classification ware confirmed. Finally, according to a power company some customer data, electricity...
In modern real-time embedded systems, to utilize the versatile services of a general kernel while without sacrificing the real-time performance is a great challenge. In the previous work, the services and the real-time kernel run in the same environment without sufficient protection mechanisms, which always leads to the system unreliability. We propose the jMoni architecture, which offers a novel...
Past attempts at designing and implementing high trusted systems for embedded safety-critical systems (ESCS) have centered on the concept of a monolithic security kernel and safety kernel. These approaches lead to inflexible, overly complex operating systems that are too large to evaluate at the higher assurance levels. This paper provides an overview of trusted architecture named Hades, which constructs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.