968 resultados para Linux security module


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A high-performance VLSI architecture to perform multiply-accumulate, division and square root operations is proposed. The circuit is highly regular, requires only minimal control and can be pipelined right down to the bit level. The system can also be reconfigured on every cycle to perform any one of these operations. The gate count per row has been estimated at (27n+70) gate equivalents where n is the divisor wordlength. The throughput rate, which equals the clock speed, is the same for each operation and is independent of the wordlength. This is achieved through the combination of pipelining and redundant arithmetic. With a 1.0 µm CMOS technology and extensive pipelining, throughput rates in excess of 70 million operations per second are expected.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Preparation for Practice module at the University of Ulster is delivered to 170 first year students via a collaborative arrangement between higher and further education institutions. In each of the five sites, students receive large group and small group teaching facilitated by social work training agency workers and academic tutor dyads. An evaluation of the module sought the perceptions of the agency and academic facilitators regarding the overall collaborative arrangement and the model of co-teaching involving social work academics and agency partners. Respondents were asked to complete a semi-structured questionnaire, which generated data from a Likert scale and also invited qualitative commentary. The Likert scale data were analysed via SPSS and the qualitative information was scrutinised using a manual thematic analysis technique. Findings indicated that continuous communication, consistency in programme content and the acknowledgement of the differences in organisation resources were key to a successful collaborative arrangement. It was also noted that a co-teaching model should be viewed as a positive vehicle for achieving module objectives in a safe learning environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dual-rail encoding, return-to-spacer protocol, and hazard-free logic can be used to resist power analysis attacks by making energy consumed per clock cycle independent of processed data. Standard dual-rail logic uses a protocol with a single spacer, e.g., all-zeros, which gives rise to energy balancing problems. We address these problems by incorporating two spacers; the spacers alternate between adjacent clock cycles. This guarantees that all gates switch in every clock cycle regardless of the transmitted data values. To generate these dual-rail circuits, an automated tool has been developed. It is capable of converting synchronous netlists into dual-rail circuits and it is interfaced to industry CAD tools. Dual-rail and single-rail benchmarks based upon the advanced encryption standard (AES) have been simulated and compared in order to evaluate the method and the tool.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explores the associations between mothers' religiosity, and families' and children's functioning in a stratified random sample of 695 Catholic and Protestant motherchild dyads in socially deprived areas in Belfast, Northern Ireland, a region which has experienced centuries of sectarian conflict between Protestant Unionists and Catholics Nationalists. Findings based on mother and child surveys indicated that even in this context of historical political violence associated with religious affiliation, mothers' religiosity played a consistently positive role, including associations with multiple indicators of better family functioning (i.e., more cohesion and behavioral control and less conflict, psychological distress, and adjustment problems) and greater parentchild attachment security. Mothers' religiosity also moderated the association between parentchild attachment security and family resources and family stressors, enhancing positive effects of cohesion and mother behavioral control on motherchild attachment security, and providing protection against risks associated with mothers' psychological distress. Findings are discussed in terms of implications for understanding the role of religiosity in serving as a protective or risk factor for children and families.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SALT threatened to institutionalize a bipolar world order. NWS and NNWS alike feared that the US and SU will prioritize global security principles such as systemic stability and conflict stability to Atlantic and European security. Endangered was Europe’s security and position in the future world order. Parity in strategic weapons invalidated the US nuclear umbrella. An ABM deployment and a non-transfer regime threatened Europe’s nuclear defence options. The danger of a Limited War or a denuclearization of Central Europe led to a European co-ordination on nuclear arms control to assure the preservation of the West and the future of Europe.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The scheduling problem in distributed data-intensive computing environments has become an active research topic due to the tremendous growth in grid and cloud computing environments. As an innovative distributed intelligent paradigm, swarm intelligence provides a novel approach to solving these potentially intractable problems. In this paper, we formulate the scheduling problem for work-flow applications with security constraints in distributed data-intensive computing environments and present a novel security constraint model. Several meta-heuristic adaptations to the particle swarm optimization algorithm are introduced to deal with the formulation of efficient schedules. A variable neighborhood particle swarm optimization algorithm is compared with a multi-start particle swarm optimization and multi-start genetic algorithm. Experimental results illustrate that population based meta-heuristics approaches usually provide a good balance between global exploration and local exploitation and their feasibility and effectiveness for scheduling work-flow applications. © 2010 Elsevier Inc. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the core elements of successful planning is the individuals’ experience of their shared open spaces. This paper attributes to the relationship between safety and urban design by means of natural surveillance and security in the city’s shared spaces. It examines how political claims over space reassembled alternative definitions of security in one of Cairo’s oldest quarters, and how ambitious planning schemes were mostly driven by problems of insecurity, chaos and disorder. The main crux to this account is based on original documents, interviews and maps which reveals considerable insights and accounts of how this vision affected the quarter’s spatial quality and the user’s reactions to his new spatial formula. It also reveals conflicting conceptions of safety and security between the planning ambitions and the users experiences, which not only lacked reliable visions for securing the quarter, but also resulted further disruption to their everyday living spaces.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several logic gates and switches can be accessed from two different combinations of a single set of fluorophore, receptor and spacer components.