The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a compact display system with a network interface to receive video signals from a server. This system has been built on a small digital circuit board with an integrated DSP&CPU chip and embedded in our prototype portable projector. The network interface is made detachable by using a network adaptor on a USB port. This architecture makes it highly configurable and easy to change...
Device drivers are the major cause of operating system failure. Prior research proposed frameworks to improve the reliability of device drivers by means of driver restart. While avoiding any instrumentation of the driver, this approach does not always allow graceful recovery. In this paper, we propose a framework for self-healing device drivers that lets the driver developer consider and implement...
In this paper, we present a method for providing quality of service using bandwidth limitation. In practical demonstration of the idea, we have used an algorithm for packet queuing, a technique applicable in a setup where the systems are connected to the Internet through a server and the server receives and distributes all the packets requested from the all the users in the network. The idea basically...
We present a new method for managing bandwidth which is allocated among several services. In implementation of the idea, we have used a queuing algorithm, a packet queuing technique applicable in a setup where the systems are connected to the Internet through a server (running our module) and the server receives all the packets requested from the all the services. The technique basically involves...
Virtualization technology has attracted much attention in recent years. This paper describes the vision and mission of ChinaV, which is the national fundamental research program for virtualization technology in China. Furthermore, related topics about single host virtualization, multiple VM management schemes and desktop virtualization will be introduced. We first describe a remote memory virtualization...
Most applications are consisted of several activities that are fulfilled by different processes. And even processes are included different child processes named light processes or threads. The basic idea of dividing the whole activities to processes is followed by the reusability and sharing ideas. Therefore, applications need an IPC mechanism to establish the communication between the processes....
This paper aims at unveiling the real and complete structure of the Symbian S60 v3 (third edition) platform filesystem, which is considered one of the most secure and armored systems issued by Symbian Ltd. in the last two years. By analyzing the unique features of security, which have been applied at the filesystem level, it will become clear how to develop applications for digital forensic purposes...
OSCAR has matured over the years into a very capable, yet simple high-performance clustering platform solution. Ease of building and administrating a cluster, effective resource management and scalable performance are some of the issues which have gathered a lot of focus in the HPC domain lately. This technical paper describes the integration of OSCAR and PERCEUS, which aims to enable the deployment...
Software-based usage controls typically are vulnerable to attacks. Trusted platform modules (TPMs) can enable much more robust controls. However, as conventionally understood, TPM-secured systems may not support software updates or asynchronous communication. We contribute techniques that overcome these limitations, enabling updates, secure transmission of usage-controlled files via email or removable...
Large-scale parallel applications often produce immense quantities of data that need to be analyzed. To avoid performing repeated, costly disk accesses, analysis of large data sets generally requires a commensurately large amount of memory. While some data-analysis tools can easily be parallelized to distribute memory across a cluster, other tools are either difficult to parallelize or, in the case...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.