摘要:
The present invention, in one embodiment, provides a method of forming an organic electric device that includes providing a plurality of carbon nanostructures; and dispersing the plurality of carbon nanostructures in a polymeric matrix to provide a polymeric composite, wherein when the plurality of carbon nanostructures are present at a first concentration an interface of the plurality of carbon nanostructures and the polymeric matrix is characterized by charge transport when an external energy is applied, and when the plurality of carbon nanostructures are present at a second concentration the interface of the plurality of carbon nanostructures and the polymeric matrix are characterized by exciton dissociation when an external energy is applied, wherein the first concentration is less than the second concentration.
摘要:
The present invention, in one embodiment, provides a method of forming an organic electric device that includes providing a plurality of carbon nanostructures; and dispersing the plurality of carbon nanostructures in a polymeric matrix to provide a polymeric composite, wherein when the plurality of carbon nanostructures are present at a first concentration an interface of the plurality of carbon nanostructures and the polymeric matrix is characterized by charge transport when an external energy is applied, and when the plurality of carbon nanostructures are present at a second concentration the interface of the plurality of carbon nanostructures and the polymeric matrix are characterized by exciton dissociation when an external energy is applied, wherein the first concentration is less than the second concentration.
摘要:
The present invention, in one embodiment, provides a method of forming an organic electric device that includes providing a plurality of carbon nanostructures; and dispersing the plurality of carbon nanostructures in a polymeric matrix to provide a polymeric composite, wherein when the plurality of carbon nanostructures are present at a first concentration an interface of the plurality of carbon nanostructures and the polymeric matrix is characterized by charge transport when an external energy is applied, and when the plurality of carbon nanostructures are present at a second concentration the interface of the plurality of carbon nanostructures and the polymeric matrix are characterized by exciton dissociation when an external energy is applied, wherein the first concentration is less than the second concentration.
摘要:
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims.
摘要:
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims.
摘要:
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims.
摘要:
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network.
摘要:
Efficiently tracking activations to rows of memory using a reduced number of row activation counters that indicate whether a memory row is activated during an activation period and row activation counters that indicate a number of permitted activations to a memory row within a maximum activation window.
摘要:
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network.
摘要:
Efficiently tracking activations to rows of memory using a reduced number of row activation counters that indicate whether a memory row is activated during an activation period and row activation counters that indicate a number of permitted activations to a memory row within a maximum activation window.