Search

Your search keyword '"Volatile memory"' showing total 548 results

Search Constraints

Start Over You searched for: Descriptor "Volatile memory" Remove constraint Descriptor: "Volatile memory"
548 results on '"Volatile memory"'

Search Results

2. A Comprehensive Literature Review on Volatile Memory Forensics.

5. Biomembrane‐Based Memcapacitive Reservoir Computing System for Energy‐Efficient Temporal Data Processing.

6. Proton‐Conducting Hierarchical Composite Hydrogels Producing First Soft Memcapacitors with Switchable Memory.

7. The Evolution of Volatile Memory Forensics

8. TEA-RC: Thread Context-Aware Register Cache for GPUs

9. Volatile Memory Disk Forensics: Investigate the Criminal Activity of RAMDisk

10. The Evolution of Volatile Memory Forensics.

11. Process based volatile memory forensics for ransomware detection.

12. Windows Physical Memory Analysis to Detect the Presence of Malicious Code

13. Forensics Data Recovery of Skype Communication from Physical Memory

14. An Organic Optoelectronic Synapse with Multilevel Memory Enabled by Gate Modulation.

16. Switching Dynamics of Ag-Based Filamentary Volatile Resistive Switching Devices—Part II: Mechanism and Modeling.

17. Schematic Processing inWorking Memory TasksRelies on Learning and Long-Term Memory Resources

18. The SymbolicWorking Memory:memory accommodations for schematic processing of symbolic information

19. Functional Applications of Future Data Storage Devices.

20. Challenges in Android Forensics

22. Thermochromic Color Switching to Temperature Controlled Volatile Memory and Counter Operations with Metal–Organic Complexes and Hybrid Gels.

23. Brain-Inspired Reservoir Computing Using Memristors with Tunable Dynamics and Short-Term Plasticity.

24. Light Memory Operation Based on a Double Pin SiC Device

25. Frugal discrete memristive device based on potassium permanganate solution

26. Nonvolatile and Volatile Memory Characteristics of a Silicon Nanowire Feedback Field-Effect Transistor With a Nitride Charge-Storage Layer.

27. Study of an interesting physical mechanism of memory effect in nematic liquid crystal dispersed with quantum dots.

28. Thorough Understanding of Retention Time of Z2FET Memory Operation.

29. HEART: <u>H</u> ybrid Memory and <u>E</u> nergy- <u>A</u> ware <u>R</u> eal- <u>T</u> ime Scheduling for Multi-Processor Systems

30. Malware: The Never-Ending Arm Race

31. Switching Dynamics of Ag-Based Filamentary Volatile Resistive Switching Devices—Part II: Mechanism and Modeling

32. Persistent software transactional memory in Haskell

33. RRAM for Compute-in-Memory: From Inference to Training

34. Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment

35. Improving Message Logging Protocols Scalability through Distributed Event Logging

36. Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining.

37. Nanostructured Fused Pyrrole Thin Films: Encoding Nano “Bits” with Temporary Remanence.

38. Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory.

39. On Using the Volatile Mem-Capacitive Effect of TiO Resistive Random Access Memory to Mimic the Synaptic Forgetting Process.

40. Enhancement of Transient Two-States Characteristics in Metal-Insulator-Semiconductor Structure by Thinning Metal Thickness.

41. Flexible multi-level quasi-volatile memory based on organic vertical transistor

42. Volatile and Nonvolatile Memory Operations Implemented in a Pt/HfO₂/Ti Memristor

44. FORENSICS ANALYSIS OF PRIVACY OF PORTABLE WEB BROWSERS.

45. Strain Analysis in Submicron Electron Devices by Convergent Beam Electron Diffraction

46. Spray-Coated, Volatile and Nonvolatile, Two-Terminal, Resistive Switching Memory Devices Comprising Liquid-Exfoliated Black Phosphorus and Graphene Layers

47. Thermochromic Color Switching to Temperature Controlled Volatile Memory and Counter Operations with Metal–Organic Complexes and Hybrid Gels

48. Obtaining forensic value from the cbWndExtra structures as used by Windows Common Controls, specifically for the Editbox control.

49. Pirate Card Rejection

50. Crab-tree

Catalog

Books, media, physical & digital resources