Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Memory Forensics is a novel and fast growing field in computer forensics, providing access to volatile information unavailable from a disk image. The memory forensics commenced when malware writers began reducing their footprints on the victim's hard disk and instead started storing crucial information within the machine's Random Access Memory. Windows 7 claims to be the most secure version of windows...
EGNOS is the European SBAS currently providing GPS Safety of Life augmentation over Europe. In parallel with on-going EGNOS operations, GNSS constellations and signals are evolving (GLONASS, GPS, GALILEO, COMPASS, …). This evolving context has led ESA to launch the so-called “European GNSS Evolution Program” (EGEP) in order to explore more in depth the various evolution perspectives and evaluate possible...
As the window system are affected by the malicious code, the vulnerability on the system are more. The behavior based monitoring is used to avoid the polymorphic malicious code. Signature based detection system or fixing these vulnerabilities are not the efficient method. Thus the behavior based monitoring is used to avoid malicious code in window system. Some of them hook high level system APIs to...
Clustering plays an important role in today's computer networks. We can achieve a higher efficiency of the whole network infrastructure by simply using idle computing power of ordinary workstations.
Today Botnets pose a serious threat to Internet Information world. Because cyber criminals are utilizing them as a powerful tool to achieve their goals easily and most importantly without leaving any trace to the defenders. So it is difficult to detect their origin. They are mainly used for many illegal activities such as Phishing, Spamming, information or email harvesting and DDoS etc. Basically...
Almost every computer user has encountered an un-responsive system failure or system hang, which leaves the user no choice but to power off the computer. In this paper, the causes of such failures are analyzed in detail and one empirical hypothesis for detecting system hang is proposed. This hypothesis exploits a small set of system performance metrics provided by the OS itself, thereby avoiding modifying...
Aiming at the problem of the poor execution efficiency and coarse grain monitoring, a host security monitoring system is designed and implemented in this paper, which rewrites the system service scheduler with setting the hook function in the kernel and conducts the fine grain monitoring with setting the policy in the user layer. This system has advantages such as the good execution efficiency, the...
Integrated Modular Avionics (IMA) systems are generally based on a common computing system (computer platform with temporal and spatial partitioning) providing common computing and data exchanging resources for multiple functions. During the development cycle, the hosted applications or functions should be developed with efficient and economical IMA prototypes. By porting the BSP and developing an...
The level 2 system of POSCO consists of general server-level computers which adopt middleware to minimize migration cost and development time of application software. In order to reduce cost and time further, POSCO, one of the leading steel companies, has been developing its own middleware in recent years. This paper describes the structure and the behavior of POSCO middleware named POSMOS. Moreover,...
In this paper, Linux-RTAI and Matlab/RTW is used to develop real-time control system for fast real-time simulation and implementation of the control algorithm. The hardware of the controller is based on PC/104 cards under Linux-RTAI operating system. The main characteristic of Matlab/RTW is that it can automatically generate the real-time simulation code for many target processors. The combination...
Stealth rootkits that hide themselves on victim systems pose a major threat to computer systems, they are usually evasive as they use sophisticated stealth technologies to conceal files, processes, kernel modules, and other types of objects. Making it extremely difficult to detect their presences in victim system. This paper mainly focuses on rootkits of windows operating system, explores the various...
Transparent computing separates computation and storage in different machines with a storage virtualization mechanism. In existing implementation, the user operating system needs to be modified to achieve storage virtualization. This paper presents a virtual machine-based network storage system for transparent computing, which uses a virtualized device model in service operating system to redirect...
With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer...
Computers are indispensable to modern human society. Often computers host multiple programs running simultaneously. However, among those programs, some maybe more time-critical than others to users. Consequently, users would hope those time-critical programs to finish their execution as soon as possible. Generally speaking, the course of program execution includes CPU operation and hard disk operation...
A distance matrix is simply an n×n two-dimensional array that contains pairwise distances of a set of n points in a metric space. It has a wide range of usage in several fields of scientific research e.g., data clustering, machine learning, pattern recognition, image analysis, information retrieval, signal processing, bioinformatics etc. However, as the size of n increases, the computation of distance...
This paper presents OpenCL Remote framework that extends the native OpenCL platform model to network scale and utilizes the native OpenCL's support of heterogeneous computing. OpenCL Remote boosts performance by distributing computation over network to many compute devices in parallel.
Computer systems often host multiple programs in execution simultaneously. Among those running programs, some may be important and time-critical, which users would expect them to finish their execution as soon as possible. Generally speaking, the course of program execution includes CPU operation and hard disk operation (disk I/O). For the CPU operation, modern computer systems have the ability to...
In this paper, we propose an implementation of a parallel one-dimensional fast Fourier transform (FFT) on the K computer. The proposed algorithm is based on the six-step FFT algorithm, which can be altered into the recursive six-step FFT algorithm to reduce the number of cache misses. The recursive six-step FFT algorithm improves performance by utilizing the cache memory effectively. We use the recursive...
Source code compiling is a non-trivial task that requires many computing resources. As a software project grows, its build time increases and debugging on a single computer becomes more and more time consuming task. An obvious solution would be a dedicated cluster acting as a build farm, where developers can send their requests. But in most cases, this solution has a very low utilization of available...
We detail the design and experiences in delivering a specialty multicore computing course whose materials are openly available. The course ambitiously covers three multicore programming paradigms: shared memory (OpenMP), device (CUDA) and message passing (RCCE), and involves significant practical work on their respective platforms: an UltraSPARC T2, Fermi GPU and the Intel Single-Chip Cloud Computer...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.