標題: Titlebook: Security and Persistence; Proceedings of the I John Rosenberg,J. Leslie Keedy Conference proceedings 1990 British Computer Society 1990 C++ [打印本頁] 作者: Dangle 時間: 2025-3-21 16:49
書目名稱Security and Persistence影響因子(影響力)
書目名稱Security and Persistence影響因子(影響力)學(xué)科排名
書目名稱Security and Persistence網(wǎng)絡(luò)公開度
書目名稱Security and Persistence網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Security and Persistence被引頻次
書目名稱Security and Persistence被引頻次學(xué)科排名
書目名稱Security and Persistence年度引用
書目名稱Security and Persistence年度引用學(xué)科排名
書目名稱Security and Persistence讀者反饋
書目名稱Security and Persistence讀者反饋學(xué)科排名
作者: 索賠 時間: 2025-3-21 21:08
Security and Persistence978-1-4471-3178-6Series ISSN 1431-1682 作者: Eeg332 時間: 2025-3-22 01:35
Workshops in Computinghttp://image.papertrans.cn/s/image/863471.jpg作者: 槍支 時間: 2025-3-22 04:52
https://doi.org/10.1007/978-1-4471-3178-6C++ programming language; algorithms; computer; computer architecture; data structures; databases; languag作者: FAZE 時間: 2025-3-22 10:27 作者: 令人悲傷 時間: 2025-3-22 16:47
Algorithms for Data EncryptionAn overview of well known and not so well known data encryption systems is given. Some suggestions for their use in capability based computer systems are made and problems are pointed out.作者: 打火石 時間: 2025-3-22 18:56 作者: extinct 時間: 2025-3-23 01:02 作者: CRANK 時間: 2025-3-23 03:09 作者: Synthesize 時間: 2025-3-23 08:22 作者: 否認 時間: 2025-3-23 09:55
R. Morrison,M. P. Atkinsonze? f?rdern. Besonders ist hier auf die Einrichtung eines strikt parlamentarischen Regierungssystems zu verweisen, welches für die Errin-gung und Bewahrung von Regierungsmacht zumindest halbwegs stabile Parteistrukturen fordert. Ferner h?ngt es stark von politisch-kulturellen Traditionslinien bzw. T作者: 綁架 時間: 2025-3-23 15:42
C. S. Wallace,R. D. Posens how to control the base turbulence model with the intermi.This book provides the intermittency equation that is derived a priori. Since the intermittency equation is mathematically obtained, the resulting gamma transition model no longer requires any extra parameters and terms to explicitly accou作者: 為寵愛 時間: 2025-3-23 19:39
Wilhelm Müllera because this disorder is characterized by exposure to intermittent hypoxia, one stimulus known to initiate long-term facilitation. It has been suggested that activation of long-term facilitation may serve to mitigate apnea by facilitating minute ventilation and, perhaps more importantly, upper air作者: concentrate 時間: 2025-3-23 22:40
B. Freisleben,P. Kammerer,J. L. Keedyal functions in the brainstem that likely play an important role in both the initiation and progression of cardiovascular diseases associated with obstructive sleep apnea including hypertension and arrhythmia. Current research suggests the targets of chronic intermittent hypoxia include increased re作者: 親愛 時間: 2025-3-24 05:50
ent from neonatal to puberty. Groups of two male and two female 1-day-old sibling mice each were subjected for 1, 2, or 4 weeks to normal atmospheric conditions or to chronic intermittent hypoxia, and the transcriptomes of their hearts profiled and compared. Our previous papers reported alterations 作者: 大洪水 時間: 2025-3-24 06:50 作者: 遺棄 時間: 2025-3-24 10:58 作者: 表臉 時間: 2025-3-24 16:58
A. L. Brown,R. Morrison,D. S. Munro,A. Dearle,J. Rosenberg) and the 5:2 diet (2 fast days per week, 5 ad libitum feast days) on body weight and markers of cardiometabolic health in humans. Results reveal that ADF and 5:2 can produce clinically significant weight loss in individuals with overweight or obesity. Clinical trial evidence shows that these diets 作者: cringe 時間: 2025-3-24 19:12
J?rg Kaiseritional strategy that targets the biology of aging and therefore has the potential to delay the onset or slow the progression of age-related diseases. Life span extension by CR has been demonstrated in a variety of species, including yeast, drosophila, worms, rodents, and dogs, providing compelling 作者: 慌張 時間: 2025-3-25 02:01
David Koch,John Rosenberglth and behavior lifestyle interventions comprehensively address nutritional, physical activity, and behavioral topics to achieve clinically meaningful weight loss. There has been increased interest in alternative interventional approaches that can be implemented without requiring additional resourc作者: critic 時間: 2025-3-25 04:16
M. Reitenspie?) and the 5:2 diet (2 fast days per week, 5 ad libitum feast days) on body weight and markers of cardiometabolic health in humans. Results reveal that ADF and 5:2 can produce clinically significant weight loss in individuals with overweight or obesity. Clinical trial evidence shows that these diets 作者: 異端 時間: 2025-3-25 10:20 作者: 面包屑 時間: 2025-3-25 12:42 作者: 俗艷 時間: 2025-3-25 18:59
Dimensions of Addressing Schemesorthogonal dimensions identified. These are: (i) number of address spaces per system, (ii) number of address-mapping tiers, (iii) when and how often mapping functions are performed and (iv) implementation of the access matrix (via capabilities or access-control lists). The number of address-mapping 作者: Kidnap 時間: 2025-3-25 22:11
Protection in Persistent Object Systemstected to ensure that it is free from misuse. The mechanisms used to protect the data vary with a tradeoff between static expression of the protection and the flexibility in modelling it. In this paper we explore the full range of protection mechanisms in persistent systems from static to dynamic ch作者: glans-penis 時間: 2025-3-26 02:57
A Model for Protection in Persistent Object-Oriented Systemscan often be expressed in terms not easily captured by this simple view of subjects and objects. The paper considers how a system can be viewed as a collection of objects of particular classes and types and with particular compositions. In order to express the variety of possible protection conditio作者: 束以馬具 時間: 2025-3-26 05:27 作者: Orthodontics 時間: 2025-3-26 10:51 作者: patella 時間: 2025-3-26 14:52 作者: CURB 時間: 2025-3-26 19:22 作者: BRIBE 時間: 2025-3-27 00:21 作者: ALTER 時間: 2025-3-27 03:16 作者: Preamble 時間: 2025-3-27 06:35
An Architecture Supporting Security and Persistent Object Storageion from the conventional main memory (also virtual memory) - external memory separation. Both requirements have been fulfilled in the BiiN. architecture. On-chip support for permanent checking of object type and rights is based upon a capability implementation. Also, capabilities are used for objec作者: xanthelasma 時間: 2025-3-27 11:33
1431-1682 previously worked together for more than a decade in Australia we had not seen each other for over a year, following my move to Bremen in 1988. Meanwhile John was spending a year on study leave at the University of St. Andrews in Scotland with Professor Ron Morrison and his persistent programming re作者: 受傷 時間: 2025-3-27 17:24 作者: ABASH 時間: 2025-3-27 21:25
Protection in Persistent Object Systemsecking and contrast it with the corresponding balance between safety and flexibility in the system. Protection by capabilities, dynamic universal union types, encapsulation, subtype inheritance, existential quantification and predicate defined invariants will be explored with reference to manipulating long lived data.作者: 規(guī)章 時間: 2025-3-27 22:51
A Layered Persistent Architecture for Napier88 store where the protection is enforced by a high level type system. The architecture has been used to construct the persistent programming system for Napier88 and is powerful enough to support languages with similar type systems.作者: 陰郁 時間: 2025-3-28 05:10
Persistent Languages and Architecturesstion of how these languages should be implemented and what architectural support is required for persistence..Here we will review the concepts of persistence and re-examine the design issues that appear in persistent languages and architectures.作者: Minutes 時間: 2025-3-28 10:21 作者: 本土 時間: 2025-3-28 13:56
A Model for Protection in Persistent Object-Oriented Systems, language and programmed) and related back to the classification of requirements. Finally we present the MONADS protection mechanisms as an example of an efficient implementation for access rules, showing how a security policy might in practice be implemented to fulfil protection requirements expressed in terms of the model.作者: 潰爛 時間: 2025-3-28 15:09
Implementing 128 Bit Persistent Addresses on 80x86 Processorsber of objects. The paper examines software and hardware techniques that can be used to map dynamically from network wide object identifiers to hardware supported segments. Four techniques are presented, two software and two hardware assisted techniques. The two software methods and one of the hardware methods have been implemented.作者: 充氣球 時間: 2025-3-28 19:40
A Secure RISC-based Architecture Supporting Data Persistenceng these requirements. The resulting system provides fine-grain control over access to data and inherent support for persistence. An additional feature of the MONADS-MM design is support for a main memory of up to 64 gigabytes.作者: 協(xié)迫 時間: 2025-3-28 23:25 作者: Apoptosis 時間: 2025-3-29 07:03 作者: 防銹 時間: 2025-3-29 10:07 作者: Euthyroid 時間: 2025-3-29 12:01 作者: 猜忌 時間: 2025-3-29 19:07 作者: INTER 時間: 2025-3-29 21:33 作者: 啟發(fā) 時間: 2025-3-30 01:06 作者: 外星人 時間: 2025-3-30 07:24
Roger M. Needhamschen Sozialstaates konstituiert worden ist. Gem?? dem Subsidiarit?tsprinzip, wie es in den einschl?gigen Sozialgesetzen — insbesondere dem Bundessozialhilfegesetz (BSHG) und dem Kinder-und Jugendhilfegesetz (KJHG) — geregelt worden ist, genie?en die Tr?ger der Freien Wohlfahrtspflege gegenüber ?ffe