Searched full:challenges (Results 1 – 19 of 19) sorted by relevance
17 challenges to building trusted systems because they omit providing secure21 these challenges and provide software with security guarantees similar to
12 `discussion <https://lwn.net/Articles/870581/>`_ about the challenges in
149 Merging into the mainline brings its own challenges.
7 control dependencies also pose other challenges, which leads to the
199 * The challenges over here are same as x86 vector domain so in imsic_irq_force_complete_move()
253 to continue. There are a couple of challenges associated with this work,
23 time introduces a new set of challenges because it introduces a multiplexed485 challenges arise. The most obvious problem is that time is now shared between
393 * - this includes challenges, responses, some aborts and call terminal packet
140 4. Weakly ordered CPUs pose special challenges. Almost all CPUs
483 * concatenation of the two challenges C1 and C2 (i.e., generated
520 * This state machine should address following challenges : in tsc2046_adc_timer()
311 challanges||challenges
77 non-uniform access times (NUMA) presents additional challenges for
114 * in MMU_NOTIFY_UNMAP event) presents several challenges, with the main one
1086 * rename a file hierarchy brings some challenges. Indeed, moving or linking a
1049 * a fair chance to prove itself without too many challenges.
2753 * significant challenges in utilizing load balancing among the in ccs_engine_wa_mode()
1112 * a fair chance to prove itself without too many challenges.
6589 * There are two challenges in supporting CPU hotplug. Firstly, there