Mostrando 101 - 120 Resultados de 13,723 Para Buscar '"Hardware"', tiempo de consulta: 0.12s Limitar resultados
  1. 101
    “…Virtual machine introspection tools are usually deployed either in hypervisor or in privileged virtual machines, which might also be compromised. By utilizing hardware support including nested virtualization, EPT protection and #BP, we are able to monitor all hypercalls belongs to the virtual machines of one hypervisor, include that of privileged virtual machine and even when the hypervisor is compromised. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 102
    “…Hyperparameters and learning algorithms for neuromorphic hardware are usually chosen by hand to suit a particular task. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 103
  4. 104
  5. 105
  6. 106
    por Jamsa, Kris, 1960-
    Publicado 2002
    Libro
  7. 107
  8. 108
  9. 109
  10. 110
    “…To assure that the installed collimators will protect the machine and permit the required performance of the collider, an appropriate hardware commissioning has to be implemented. In this contribution we describe the procedures for the hardware commissioning of the LHC collimation system. …”
    Enlace del recurso
    Enlace del recurso
  11. 111
  12. 112
  13. 113
  14. 114
  15. 115
  16. 116
  17. 117
  18. 118
  19. 119
  20. 120
    “…To manage these changes better a project codenamed hardware hound focusing on hardware failure trending and hardware inventory has been started at CERN. …”
    Enlace del recurso
    Enlace del recurso
Herramientas de búsqueda: RSS