Listing 1 - 10 of 20 | << page >> |
Sort by
|
Choose an application
Programming --- Java (Computer program language) --- Threads (Computer programs) --- Java (Langage de programmation) --- 681.33 --- Threaded programming (Computer science) --- Threading (Computer programs) --- Computer programs --- Object-oriented programming languages --- JavaSpaces technology --- Programmering
Choose an application
Threads (Computer programs) --- POSIX (Computer software standard) --- Threaded programming (Computer science) --- Threading (Computer programs) --- Computer programs --- Portable Operating System Interface (Computer software standard) --- Operating systems (Computers) --- Standards --- POSIX (Computer software standard). --- Threads (Computer programs). --- UNIX (Computer file) --- UNIX (Computer operating system)
Choose an application
This book describes a specification, microarchitecture, VHDL implementation and evaluation of a SPARC v8 CPU with fine-grain multi-threading, called micro-threading. The CPU, named UTLEON3, is an alternative platform for exploring CPU multi-threading that is compatible with the industry-standard GRLIB package. The processor microarchitecture was designed to map in an efficient way the data-flow scheme on a classical von Neumann pipelined processing used in common processors, while retaining full binary compatibility with existing legacy programs. Describes and documents a working SPARC v8, with fine-grain multithreading and fast context switch; Provides VHDL sources for the described processor; Describes a latency-tolerant framework for coupling hardware accelerators to microthreaded processor pipelines; Includes programming by example in the micro-threaded assembly language. .
Mathematical physics. --- Computer architecture --- Simultaneous multithreading processors --- Field programmable gate arrays --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Electrical Engineering --- Computer Science --- Threads (Computer programs) --- Field programmable gate arrays. --- Threaded programming (Computer science) --- Threading (Computer programs) --- Field programmable logic arrays --- FPGAs --- Engineering. --- Microprocessors. --- Electronics. --- Microelectronics. --- Electronic circuits. --- Circuits and Systems. --- Processor Architectures. --- Electronics and Microelectronics, Instrumentation. --- Gate array circuits --- Programmable logic devices --- Computer programs
Choose an application
Programming --- Java (informatica) --- Java (Computer program language) --- Parallel programming (Computer science) --- Java (Langage de programmation) --- Programmation parallèle (Informatique) --- Threads (Computer programs) --- 681.3*D3 --- 005.133 --- Threaded programming (Computer science) --- Threading (Computer programs) --- Computer programs --- Computer programming --- Parallel processing (Electronic computers) --- Object-oriented programming languages --- JavaSpaces technology --- Programming languages --- Java (Computer program language). --- Parallel programming (Computer science). --- Threads (Computer programs). --- 681.3*D3 Programming languages --- Programmation parallèle (Informatique)
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
Technology: general issues --- industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
Technology: general issues --- industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
Programming --- Threads (Computer programs) --- POSIX (Computer software standard) --- Electronic digital computers --- Programmation des ordinateurs --- Programming. --- Computer programming --- 681.3*D41 --- Computers --- Electronic computer programming --- Electronic data processing --- Programming (Electronic computers) --- Coding theory --- Portable Operating System Interface (Computer software standard) --- Operating systems (Computers) --- Threaded programming (Computer science) --- Threading (Computer programs) --- Computer programs --- Process management: concurrency; deadlocks; multiprocessing/multiprogramming;mutual exclusion; scheduling; synchronization (Operating systems) --- Standards --- Computer programming. --- POSIX (Computer software standard). --- Threads (Computer programs). --- 681.3*D41 Process management: concurrency; deadlocks; multiprocessing/multiprogramming;mutual exclusion; scheduling; synchronization (Operating systems)
Choose an application
Programming --- Parallel programming (Computer science) --- Electronic data processing --- Threads (Computer programs) --- Programmation parallèle (Informatique) --- Traitement réparti --- Distributed processing. --- -Threads (Computer programs) --- 681.3*D4 --- Threaded programming (Computer science) --- Threading (Computer programs) --- Computer programs --- ADP (Data processing) --- Automatic data processing --- Data processing --- EDP (Data processing) --- IDP (Data processing) --- Integrated data processing --- Computers --- Office practice --- Computer programming --- Parallel processing (Electronic computers) --- Distributed processing --- Operating systems--See also {681.3*C} --- Automation --- 681.3*D4 Operating systems--See also {681.3*C} --- Programmation parallèle (Informatique) --- Traitement réparti --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks
Choose an application
Java (Computer program language). --- Threads (Computer programs). --- Threads (Computer programs) --- Threads (Computerprogramma's) --- Threads (Programmes d'ordinateur) --- Threaded programming (Computer science) --- Threading (Computer programs) --- language classifications: applicative languages; data-flow languages; design languages; extensible languages; macro and assembly languages; nonprocedural languages; specialized application and very high-level languages (Programminglanguages) --- 681.3*D32 language classifications: applicative languages; data-flow languages; design languages; extensible languages; macro and assembly languages; nonprocedural languages; specialized application and very high-level languages (Programminglanguages) --- Java (Computer program language) --- 005.133 --- 681.3*D32 --- Computer programs --- Object-oriented programming languages --- JavaSpaces technology
Listing 1 - 10 of 20 | << page >> |
Sort by
|