Various models of solubility of gas in two-phase ows of gas and liquid are considered. Such phenomena play an important role in various technical devices especially at modern nuclear power plants. Mathematical models ...
详细信息
The paper investigates the implementation of virtual networks on the SDN data plane, modeled by a graph of physical connections between network nodes. A virtual network is defined as a set of ordered host pairs (sende...
详细信息
The main difference between container-based and virtualization-based cloud environments is the way of the virtualization methods for OS and auxiliary resources. Software applications can be both deployed in a cloud on...
详细信息
The article presents the results of a study of the field material of the Purovsky dialect of the Forest Nenets language. His experimental phonological analysis was conducted using the LingvoDoc data processing algorit...
详细信息
CPAchecker is a framework for software verification, built on the foundations of Configurable Program Analysis (CPA). For the SV-COMP'14, we file a CPAchecker configuration that runs up to five analyses in sequenc...
详细信息
Recent advancements in the embedded systems field have resulted in more complicated systems with application-specific blocks (IP cores), often known as system on Chip (SoC) devices. Several redundancy-based embedded d...
详细信息
Nowadays, exploits often rely on a code-reuse approach. Short pieces of code called gadgets are chained together to execute some payload. Code-reuse attacks can exploit vul-nerabilities in the presence of operating sy...
详细信息
Input/Output (I/O) automata are widely used when deriving high quality tests for (components of) complex discrete systems based on so called distinguishing sequences. For I/O automata, the number of distinguishability...
详细信息
In this paper, a Safety system-on-Chip based on the open-source RISC-V processor SweRV EH1 from Western Digital is presented. A hardware comparator concept is followed. The SSoC is implemented on a Xilinx FPGA system ...
详细信息
This project is an attempt to combine the advantages of software flexibility and security of hardware firewalls. It aims at the implementation of these advantages in the hypervisor source code for the purpose of creat...
详细信息
ISBN:
(纸本)9789898565242
This project is an attempt to combine the advantages of software flexibility and security of hardware firewalls. It aims at the implementation of these advantages in the hypervisor source code for the purpose of creating user data confidentiality protection against its leakage from the personal computer through the network. The hypervisor implementation is based on the hardware virtualization extensions of both processors and motherboards. This constitutes a key feature, which enables hypervisor to combine the following advantages: the advantages of access to the OS environment and hardware protection against various intruders' methods of compromise, including those capable of exploiting OS kernel resources for performing the malicious actions.
暂无评论