Filters








141,659 Hits in 6.7 sec

A multi-level secure file sharing server and its application to a multi-level secure cloud

Mark R. Heckman, Roger R. Schell, Edwards E. Reed
2015 MILCOM 2015 - 2015 IEEE Military Communications Conference  
The requirements for certifiable, scalable, multi-level cloud security are threefold: 1) To have trusted, high-assurance components available for use in creating a multi-level secure cloud environment;  ...  A "multi-level" secure cloud environment thus typically consists of multiple, isolated clouds, each of which handles data of only one security level.  ...  An additional level of complexity is added in environments where controlled sharing (as opposed to complete isolation) of data between different domains must be supported.  ... 
doi:10.1109/milcom.2015.7357613 dblp:conf/milcom/HeckmanSR15 fatcat:x3sp7fumlfdrvnofpydmef3gam

The Effect of Root Canal Preparation Using Single Versus Multiple Endodontic Rotary Files on Post-operative Pain, a Randomised Clinical Trial

Mohsen Aminsobhani, Naghmeh Meraji, Alireza Khoshdel, Abdollah Ghorbanzadeh
2017 European Endodontic Journal  
The post-operative pain did not differ between the single and multi-file root canal preparation techniques evaluated in this study.  ...  When comparing different instruments and systems for canal preparation, the analgesic consumption, incidence and intensity of post-operative pain did not differ (p>0.05).  ...  Levels of pain were recorded by the nurse who was unaware of the instrumentation technique appointed to the patients (14, 15) . A numerical rating scale (NRS) was used for recording pain levels.  ... 
doi:10.14744/eej.2017.17018 pmid:33403334 pmcid:PMC7757951 fatcat:udqkv2hjnfcsxodbejhx3gzdda

Performance Enhancement of Database Driven Technique using Cynosure Method in Cloud

Deepak Begrajka, Avini Sogani, Arpit Jain
2014 International Journal of Computer Applications  
To provide a system which balances these aspects and to serve quick and exact results to isolated users is a biggest challenge.  ...  share a common need for accurate prognostic models of performance and resource utilization.  ...  They focused on the design space for achieving performance isolation between tenants.  ... 
doi:10.5120/18138-9326 fatcat:adqjempenbh7fa56qm33jhjacy

An Approach to Secure Multi-Tenancy in Cloud Computing

Rajalakshmi. S
2018 International Journal for Research in Applied Science and Engineering Technology  
Cloud Computing provides a multi-tenant feature to host multiple tenants.  ...  Basically, "cloud" can be referred as an internet-based environment for computing resources consisting of servers, software applications that are accessed by any individuals with internet connectivity.  ...  at this level 3) Network Layer -Techniques like zoning, VLANs can be used for network separation.  ... 
doi:10.22214/ijraset.2018.4717 fatcat:tvviazeb3jforjcofqyq6kakvy

MultiPARTES: Multicore Virtualization for Mixed-Criticality Systems

Salvador Trujillo, Alfons Crespo, Alejandro Alonso
2013 2013 Euromicro Conference on Digital System Design  
In this approach, subsystems with different levels of criticality can be placed in different partitions and can be verified and validated in isolation.  ...  Modern embedded applications typically integrate a multitude of functionalities with potentially different criticality levels into a single system.  ...  The system architect can relax this property by defining specific shared memory areas between partitions. x Temporal isolation: A partition is executed under a cyclic policy.  ... 
doi:10.1109/dsd.2013.37 dblp:conf/dsd/TrujilloCA13 fatcat:2z3fpqxdvfecpa2zv4jd3mj4se

Enabling Efficient and Flexible FPGA Virtualization for Deep Learning in the Cloud [article]

Shulin Zeng, Guohao Dai, Hanbo Sun, Kai Zhong, Guangjun Ge, Kaiyuan Guo, Yu Wang, Huazhong Yang
2020 arXiv   pre-print
We enable the isolation by introducing a two-level instruction dispatch module and a multi-core based hardware resources pool.  ...  Such designs provide isolated and runtime-programmable hardware resources, further leading to performance isolation for multiple users.  ...  We proposed a multi-core hardware resources pool technique to support the SDM based multi-user scenario, by dividing a single large core into multiple small cores.  ... 
arXiv:2003.12101v1 fatcat:zzwoc4hp5rgpbehz2wr6d2mwiq

A Unified FPGA Virtualization Framework for General-Purpose Deep Neural Networks in the Cloud

Shulin Zeng, Guohao Dai, Hanbo Sun, Jun Liu, Shiyao Li, Guangjun Ge, Kai Zhong, Kaiyuan Guo, Yu Wang, Huazhong Yang
2022 ACM Transactions on Reconfigurable Technology and Systems  
The isolation is enabled by introducing a two-level instruction dispatch module and a multi-core based hardware resources pool.  ...  Such designs provide isolated and runtime-programmable hardware resources, which further leads to performance isolation for multi-tenant sharing.  ...  Using these techniques, the multi-core HRP based virtualized RNN accelerator can ensure a good resource and a strong performance isolation, in the public cloud scenarios.  ... 
doi:10.1145/3480170 fatcat:kgrhiohisvcdxm635l3wykgdri

Using single-cell multiple omics approaches to resolve tumor heterogeneity

Michael A. Ortega, Olivier Poirion, Xun Zhu, Sijia Huang, Thomas K. Wolfgruber, Robert Sebra, Lana X. Garmire
2017 Clinical and Translational Medicine  
In addition, the development of new techniques for combining single-cell multi-omic strategies is providing a more precise understanding of factors contributing to cellular identity, function, and growth  ...  In this manner, the complex heterogeneous microenvironment of a tumour promotes the likelihood of angiogenesis and metastasis.  ...  Acknowledgements We would like to thank all the members of the Garmire Lab for their helpful discussions and manuscript review.  ... 
doi:10.1186/s40169-017-0177-y pmid:29285690 pmcid:PMC5746494 fatcat:4o55gjckdfdurcrus4ftrldzbu

System-Level Support for Composition of Applications

Brian Kocoloski, Kevin Pedretti, Patrick G. Bridges, John Lange, Hasan Abbasi, David E. Bernholdt, Terry R. Jones, Jai Dayal, Noah Evans, Michael Lang, Jay Lofstead
2015 Proceedings of the 5th International Workshop on Runtime and Operating Systems for Supercomputers - ROSS '15  
These mechanisms include virtualization techniques isolating application custom enclaves while using the vendor-supplied host operating system and high-performance inter-VM communication mechanisms.  ...  Current HPC system software lacks support for emerging application deployment scenarios that combine one or more simulations with in situ analytics, sometimes called multi-component or multi-enclave applications  ...  In addition to simple I/O to a file system, ADIOS supports scalable data movement between multiple applications and between a simulation and multiple workflow components without changing the writing or  ... 
doi:10.1145/2768405.2768412 dblp:conf/hpdc/KocoloskiLABJDE15 fatcat:vih2uxybcjg5npxqplyztple3a

Development of a multi-user handwriting recognition system using Tesseract open source OCR engine [article]

Sandip Rakshit, Subhadip Basu
2010 arXiv   pre-print
On a three user model, the system is trained with 1844, 1535 and 1113 isolated handwritten character samples collected from three different users and the performance is tested on 1133, 1186 and 1204 character  ...  Handwritten data samples containing isolated and free-flow text were collected from different users.  ...  Subhadip Basu is thankful to the "Center for Microprocessor Application for Training Education and Research", "Project on Storage Retrieval and Understanding of Video for Multimedia" of Computer Science  ... 
arXiv:1003.5886v1 fatcat:cj2ixdinwbabjounyaobl2h7p4

AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management [chapter]

Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen, Hao Chen, Wangjun Hong
2017 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Existing BYOD solutions lack in these aspects; we propose a system, called App-Shield, which supports multi-entity management and role-based access control with file-level granularity, apart from local  ...  As for functionalities, a BYOD solution should isolate an arbitrary number of entities, such as those relating to business and personal uses and provide fine-grained access control on multi-entity management  ...  As for multi-entity management, business apps from different companies installed on a device can be classified into various logic sets by the IT administrator.  ... 
doi:10.1007/978-3-319-59608-2_1 fatcat:tmlogodjhvd4dmhlf7dvwksisu

Automatic Arabic Hand Written Text Recognition System

Ismael Ahmad Jannoud
2007 American Journal of Applied Sciences  
Some approaches are used for processing the characters and post processing added to enhance the results. Recognized characters will be appended directly to a word file which is editable form.  ...  Thus after the segmentation stage, the cursive word is represented by a sequence of isolated characters. The recognition problem thus reduces to that of classifying each character.  ...  In the first technique, a multi-category classifier is used.  ... 
doi:10.3844/ajassp.2007.857.864 fatcat:pjtztapn2rgf5aakgxggdfiyvq

Digital Forensic Investigation Challenges based on Cloud Computing Characteristics

Ganthan Narayana Samy, Nurazean Maarop, Mohd Shahidan Abdullah, Sundresan Perum, Sameer Hasan Albakri, Bharanidharan Shanmugam, Premylla Jeremiah
2018 International Journal of Engineering & Technology  
However, the characteristics of the cloud computing environment have created many difficulties and challenges for digital forensic investigation processes.  ...  Acknowledgement The authors would like to thank Universiti Teknologi Malaysia (UTM) and Ministry of Higher Education, Malaysia for their assistance and support for this work through the Fundamental Research  ...  Service Level Agreement (SLA) An SLA in a cloud computing environment is a contract between a cloud service provider and the cloud computing end user that defines the level of service expected from the  ... 
doi:10.14419/ijet.v7i4.15.21361 fatcat:d2jbh5j3sjecbdj3vamhuxsmby

Research on the Data and Transaction Security of Enterprise E-Commerce Countermeasure

Yongyong Zhu
2013 International Journal of Security and Its Applications  
, it always demands a reliable data transmission which can meet the different functions of the data exchange system.  ...  Authentication technique of e-commerce is a process that the e-commerce users showing their identification to the system and being checked by the system.  ...  Isolation means dividing the network into several non-communicating networks according to the difference of network security level, so that the networks or devices of different security levels have no  ... 
doi:10.14257/ijsia.2013.7.6.26 fatcat:aggmir7ui5ee5nisxm3tvxec7q

Whole genome genetic variation and linkage disequilibrium in a diverse collection of Listeria monocytogenes isolates

Swarnali Louha, Richard J. Meinersmann, Travis C. Glenn, Yung-Fu Chang
2021 PLoS ONE  
We performed whole-genome multi-locus sequence typing for 2554 genes in a large and heterogenous panel of 180 Listeria monocytogenes strains having diverse geographical and temporal origins.  ...  Twenty-seven loci having lower levels of association with other genes were considered to be potential "hot spots" for horizontal gene transfer (i.e., recombination via conjugation, transduction, and/or  ...  Acknowledgments We thank USDA and FSIS for providing us with Listeria monocytogenes whole-genome sequencing samples from river water and effluents of poultry processing plants.  ... 
doi:10.1371/journal.pone.0242297 pmid:33630832 fatcat:jvhybwjqavfkxbe3m7k7fr34p4
« Previous Showing results 1 — 15 out of 141,659 results