搜索结果: 16-30 共查到“知识库 计算机存储技术”相关记录227条 . 查询时间(5.74 秒)
A computer memory with defects is modeled as a discrete memoryless channel with states that are statistically determined. The storage capacity is found when complete defect information is given to the...
EXPLODE:a Lightweight,General System for Finding Serious Storage System Errors
EXPLODE Lightweight General System Serious Storage System Errors
2015/8/7
Storage systems such as file systems, databases, and RAID systems have a simple, basic contract: you give them data, they do not lose or corrupt it. Often they store the only copy, making its irrevoca...
We provide evidence that breaking low-exponent RSA cannot be equivalent to factoring integers. We show that an algebraic reduction from factoring to breaking low-exponent RSA can be converted into an ...
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Resistant Broadcast Encryption Short Ciphertexts
2015/8/5
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both ciphertexts and priva...
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
binary fields lattice-based signatures
2015/8/5
Our scheme can be used to authenticate linear transformations of signed data, such as those arising when computing mean and least squares fit or in networks that use network coding. Our construction g...
Private Database Queries Using Somewhat Homomorphic Encryption
Somewhat Homomorphic Encryption Database
2015/8/5
In a private database query system, a client issues queries to a database and obtains the results without learning anything else about the database and without the server learning the query. While pre...
SessionJuggler: Secure Web Login From an Untrusted Terminal Using Session Hijacking
Untrusted Terminal Secure Web Login From
2015/8/5
We use modern features of web browsers to develop a secure login system from an untrusted terminal. The system, called SessionJuggler, requires no server-side changes and no special software on the te...
The RSA cryptosystem, invented by Ron Rivest, Adi Shamir, and Len Adleman [21], was rst
publicized in the August 1977 issue of Scientic American. The cryptosystem is most commonly
used for providi...
Mental abacus (MA) is a system for performing rapid and precise arithmetic by manipulating a mental
representation of an abacus, a physical calculation device. Previous work has speculated that MA is...
为了在保证胚胎电子系统可靠性的前提下降低系统的硬件消耗,提出一种新型的基因存储结构——部分基因循环存储,细胞只存储阵列的部分基因,通过细胞内、细胞间的基因循环、非循环移位实现阵列的功能分化和自修复,自修复过程中基因存储内容根据故障细胞数目进行自主更新。该存储结构中基因备份数目可由设计者根据系统可靠性和硬件消耗要求设置,不受阵列中空闲资源数目的限制。理论分析和仿真实验表明,该新型存储结构不仅实现了胚...
损耗均衡影响智能电能表中闪存固态存储系统的寿命和性能.为了提高系统寿命和性能,本文提出了一种有效减小最大擦除次数差的损耗均衡设计.该设计根据位置指针所指物理块的相对擦除次数差来决定损耗均衡是否需要启动和损耗均衡需要的物理块地址.实验结果表明,该设计相比于已有的损耗均衡方法,能有效减小最大擦除次数差,减小擦除次数方差,有效降低损耗不均衡程度.本文还对影响损耗均衡程度的触发阈值进行了分析与讨论,得出了...
Electronic Discovery: The Basics
electronic discovery bankruptcy Electronic Discovery Reference Model (EDRM) electronically stored information
2014/12/20
This article is the first in a series about electronic discovery in bankruptcy. This article will cover the basics of electronic discovery, including history, rules and resources. Future articles will...
New E-Discovery Sources, Tips and Tactics; Social Media and E-Discovery
e-discovery social media legal research email mobile apps for e-discovery
2014/12/20
Websites and other sources for researching e-discovery cases; email as evidence; mobile apps for e-discovery; social media archiving and compliance; handling social media as electronically stored info...
Enhanced Search And Efficient Storage Using Data Compression In Nand Flash Memories
Nand Flash Search data deduplication MISR
2014/12/8
NAND flash memories are popular due to their density and lower cost. However, due to serial access, NAND flash memories have low read and write speeds. As the flash sizes increase to 64GB and beyond, ...