memory protection
- 网络存储器保护;内存保护;存储保护
-
The memory protection and share mechanism can improve the reliability of the system .
通过存储保护机制提高系统健壮性。
-
Therefore , the research of the memory protection techniques is highly valuable .
因此对存储保护技术的研究有着很高的应用价值。
-
This paper describes the memory protection mechanism based on hardware virtualization .
本文主要介绍基于硬件虚拟化技术的内存保护机制。
-
Page Based Memory Protection for Embedded Real-time Operating System
嵌入式实时操作系统中基于页的内存保护
-
Analysis of Linux 2.6 Memory Protection Mechanism
Linux2.6内存保护机制研究
-
Research of Memory Protection Model of Component-Based Elastos Operating System
和欣构件化操作系统内存保护模型研究
-
Specifies the scope of memory protection to be applied by the .
方法应用的内存保护范围。
-
Furthermore , a simple memory protection mechanism is realized to improve the robustness of the system .
为提高系统的健壮性,Iota还具有一个简单的存储保护策略。
-
According to the characteristics of processor MMU , a simple memory protection and sharing mechanical is designed .
实时内核采用了分页不交换的虚拟存储机制,实现了一种简单的存储保护和共享机制;
-
It can help to make sure the system runs stably and reliably if the memory protection function is added to the embedded system .
在嵌入式系统中加入存储保护功能可以为系统的稳定可靠运行提供保障。
-
Therefore carries on the modeling to the memory protection mechanism to analyze its vulnerability to be possible further to consummate its function .
因此对内存保护机制进行建模分析其脆弱性可以进一步完善其功能。
-
The PDP-15 was compatible with the earlier PDP-9 and included various advanced features , including memory protection and floating points .
PDP-15兼容早期的PDP-9并包括各种高级功能,包括内存保护和浮动点。
-
Vega processors included a custom read barrier instruction that included bit field checking in reference metadata as well as special virtual memory protection for GC-compacted pages .
Vega处理器包含了一个客户化的读屏障指令,它具有字段检查元数据和针对GC压缩页面的特殊的虚拟内存保护。
-
Furthermore , a Memory Protection Unit ( MPU ) has been added , which is transparent to existing software but allows new applications to protect specific code or data during execution .
此外,还增加一个存储器保护单元(MPU),该功能虽然对于现有软件是透明的,但新应用软件在执行期间可以保护特定代码或数据。
-
Compared with the traditional method of memory protection , Virtualization technology can find kernel vulnerabilities that are hard to be found with traditional technology , because these rootkits have the same privilege with traditional protection technology .
相比于传统的内存保护方法,虚拟化技术可以发现传统技术很难发现的内核漏洞,因为很多内核态的rootkit和操作系统一样都处在内核态,这些rootkit和传统的防护技术拥有相同的权限。
-
In the1990s , when Copland was initiated ," next-generation " meant supporting memory protection and preemptive multitasking , both of which classic Mac OS lacked .
Copland始于上世纪90年代,「新一代」是指支持内存保护和抢先式多任务,当时的MacOS不支持这两项功能。
-
Through the control method of special function registers , a scheme of secure storage is designed , providing an effective mechanism for memory protection of important data . The starting address , area size and accessing permission could be configured by software program . 6 .
通过特殊功能寄存器控制方式设计了一种安全存储方案,为重要数据的存储保护提供了有效机制,可以软件配置存储保护区域的起始地址、区域大小和访问权限。
-
Because of shortage of memory protection measures and error diagnosis methods in common memory management algorithm , and few packing up memory fragmentations mechanism , the description of a novel memory management algorithm is primarily presented in chapter 3 . The test result of this algorithm is also described .
针对通常内存管理算法缺少内存的保护措施和错误诊断方法,也很少有内存碎片整理机制,在第三章中主要研究了通信系统中高效内存算法并进行对比测试。
-
A memory message protection technique for MICROCOMPUTER-MONITORING systems in small ammonia plants at the power failure
小氮肥厂微机监控系统的一种断电信息保护技术
-
Malfunction of undervoltage memory overcurrent protection device of DRS generator is analyzed in this paper and improvement countermeasures are put forward to eliminate incipient safety fault .
通过对DRS型发电机低压记忆过流保护误动原因的分析,对保护原理提出改进措施,消除了装置的安全隐患。
-
Allocating data in RAM can both accelerate the access speed and save space of eternal memory , providing protection for disk by reducing the direct operations on disk .
通过在内存中建立文件系统,将数据存放于内存中,既可以提高存取速度又可以节省外存空间,在某些特殊环境及设备中,可以减少对磁盘的操作,从而达到保护磁盘的目的。
-
Natural immune systems have many features such as multiple layers , distributability , diversity , error tolerance , dynamic protection , adaptability , associative memory and self protection .
自然免疫系统具有多层次、分布性、多样性、容错性、动态防护、自适应性、联想记忆、自我防护等特点。
-
In this paper it is surveyed that how antigen is ingested , presented by some antigen-presenting cells and MHC ⅱ molecules in mucosal surface , then induce immune response and memory of immune protection .
描述了黏膜免疫反应中的抗原在黏膜表面被抗原递呈细胞和MHC分子摄取、递呈给效应位点淋巴细胞,引起免疫应答,发生免疫保护记忆的过程;
-
The role of T_H cells in memory CTL mediated tumor protection
TH细胞在记忆性CTL介导的肿瘤抑制中的作用研究
-
Then we give a detail discuss of the reality of the components of the subsystem , such as process communication , timer control , memory management and the protection from exception .
随后详细的说明了支撑子系统中,进程通信服务、系统时间服务、系统的内存管理、系统异常保护等功能的实现。
-
The monolithic and process-per-browsing-instance models in Chrome do not provide memory or other resource protection across multiple principals in a monolithic process or browser instance .
Chrome的单进程和每浏览实例一进程(process-per-browsing-instance)模型都不提供在不同网站之间对内存和其它资源进行隔离保护。
-
The halting of DISA 100 supervisory computer is found due to receiving an illegal message undefined in protocols , causing memory management problem of protection manager . Poor error tolerance of protocol processing program is shown .
DISA100监控后台机死机的直接原因是接收了协议未规定的非法报文,诱因是保护管理机内存管理出错,反映了规约处理程序容错性不够的问题。
-
Thus it can find out many exceptions in progam . First , exception detection in DSP internal memory is realized using memory protection mechanism , and the sysetem has been widely used in practice .
首先,利用内存保护机制实现了DSP内存中的异常检测,并在实际系统中得到了广泛的应用。
-
The functional requirements of a secure OS are mapped into a secure MMS in accordance with Trusted Computer System Evaluation Criteria . Process isolation , prevention of memory information leak , memory access control and virtual memory protection as four function requirements of secure MMS are first presented .
依据可信计算机系统评估标准,将安全OS的功能需求依次映射到内存管理子系统,初步提出安全内存管理子系统的四个功能:进程隔离、防止内存信息泄露、内存访问控制,虚拟内存保护;
-
Since memory is the primary place to store the data , the most effective way to against attack is the protection of off-chip memory , i.e. confidentiality protection and integrity protection .
鉴于存储器是数据最主要的驻留场所,因此,防范攻击首要的是对处理器的片外存储器进行保护,其关键技术手段包括存储器的机密性和完整性保护。