Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








37 Hits in 7.0 sec

CompartOS: CHERI Compartmentalization for Embedded Systems [article]

Hesham Almatary, Michael Dodson, Jessica Clarke, Peter Rugg, Ivan Gomes, Michal Podhradsky, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson
2022 arXiv   pre-print
CompartOS builds on CHERI, a capability-based hardware architecture, to meet scalability, availability, compatibility, and fine-grained security goals.  ...  Existing high-end embedded systems face frequent security attacks.  ...  The views, opinions, and/or findings contained in this report are those of the authors and should not be interpreted as representing the official views or policies of the Department of Defense or the U.S  ... 
arXiv:2206.02852v2 fatcat:5xkwlowxbnbibk47vyyvtx2jdm

Supporting network access and service location in dynamic environments

Dirk Kutscher, Jörg Ott, Steffen Bartsch, Thomas C. Schmidt
2007 Campus-Wide Information Systems  
This paper discusses large-scale operation aspects for Network Service Maps and presents technical solutions and evaluation results.  ...  The ubiquity of WLAN services, ranging from campus networks to commercial hotspots and community WLAN services, requires a new approach for automatically locating and using services.  ...  In FLUTE transport sessions, the intervals of the File Delivery Table ( FDT) transmission play a major role for the reception latency, especially for comparably small files.  ... 
doi:10.1108/10650740710834626 fatcat:hozdkubfc5bcxnjvadfiq7dmb4

Using Name Confusion to Enhance Security [article]

Mohamed Tarek Ibn Ziad, Miguel A. Arroyo, Evgeny Manzhosov, Vasileios P. Kemerlis, Simha Sethumadhavan
2020 arXiv   pre-print
PNS achieves fast randomization, at the granularity of basic blocks, which mitigates a class of attacks known as (just-in-time) code-reuse.  ...  By building upon Name Confusion, we derive Phantom Name System (PNS): a security protocol that provides multiple names (addresses) to program instructions.  ...  SECURITY ANALYSIS & EVALUATION In this section, we present our evaluation results regarding the effectiveness of PNS and discuss its security guarantees against CRAs. A.  ... 
arXiv:1911.02038v3 fatcat:cqx5szmc6rezfg7w6zgdj6duu4

Protecting enclaves from side-channel attacks through physical isolation

Marno Van Der Maas, Apollo-University Of Cambridge Repository, Simon Moore
2022
My new enclave system uses a heterogeneous multi-core processor to physically isolate enclaves on secure cores while regular applications run on fast cores.  ...  I evaluate hardware implementation approaches in simulation and on a field-programmable gate array (FPGA).  ...  To evaluate this FMI, I use a prototype system with a single fast core and no secure cores.  ... 
doi:10.17863/cam.86186 fatcat:ozh3xhw5jfcdplqokuqwuwp444

Quantum Memory: A Missing Piece in Quantum Computing Units [article]

Chenxu Liu, Meng Wang, Samuel A. Stein, Yufei Ding, Ang Li
2023 arXiv   pre-print
With the rapid scaling of qubits, it is opportune to explore the potential and feasibility of quantum memory across different substrate device technologies and application scenarios.  ...  By presenting this work, we aim to attract more researchers from both the Quantum Information Science (QIS) and classical memory communities to enter this emerging and exciting area.  ...  quantum data lookup, etc.  ... 
arXiv:2309.14432v2 fatcat:l6bdsyx5mzfyxg4ajutprxl74y

Cold expansion effects on cracked fastener holes under constant amplitude and spectrum loading in the 2024-T351 aluminum alloy

Jacob John Warner
2012
The experiments conducted herein investigate various stress levels under constant amplitude and spectrum loading conditions.  ...  The percent cold expansion is calculated for each specimen, and the amount of crack growth from cold expansion was measured.  ...  For further evaluation of the validity of the AFGROW predictions using both lookup files and their corresponding SOLR values, the AFGROW predicted growth was plotted with the test data to evaluate how  ... 
doi:10.26053/0h-cmb1-3s00 fatcat:g54vydzx7fdhhj746ylkaj5n7i

Understanding Smart Sensors

Randy Frank
2000 Measurement science and technology  
Algorithms Versus Lookup Tables MCUs use lookup tables to store values that are accessed when the program is running.  ...  Four-fluted, two-fluted, and two-fluted square micromilling tools were manufactured with FIB micromachining.  ...  List of Acronyms and Abbreviations HLL high-level language; a programming language that utilizes macro statements and instructions that closely resemble human language or mathematical notation to describe  ... 
doi:10.1088/0957-0233/11/12/711 fatcat:inet5t3lzbecrczd2f5tdevkzq

Cross-layer energy optimization under image quality constraints for wireless image transmissions

Na Yang, Ilker Demirkol, Wendi Heinzelman
2012 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC)  
the interdisciplinary area of signal processing and machine learning towards affective computing applications and the broad human-computer interaction area.  ...  We build a lookup table with inputs being the residue name, the index of the colliding atom, and the output being a proper χ to be moved to solve the colliding atom.  ...  Table 2 .2.  ... 
doi:10.1109/iwcmc.2012.6314342 dblp:conf/iwcmc/YangDH12 fatcat:fpjsdzsu25dkbghfas5uonty3a

Conference Keynote Speaker

1983 20th Design Automation Conference Proceedings  
It contains reports on animal production, animal waste, pests, fertility and liming, soil water and irrigation, and soil physical and chemical responses to conservation tillage management.  ...  The 2005 Proceedings contains papers and abstracts of research and extension projects on a number of different aspects of conservation tillage.  ...  References ACKNOWLEDGEMENT Funding for this work was provided by the Agriculture Productivity and Profitability Program of the South Carolina Agricultural and Forestry Research System using a special  ... 
doi:10.1109/dac.1983.1585612 fatcat:6hb3ldtfhbdftbkrdkhhax2jyy

Conference Keynote Speaker

1984 21st Design Automation Conference Proceedings  
It contains reports on animal production, animal waste, pests, fertility and liming, soil water and irrigation, and soil physical and chemical responses to conservation tillage management.  ...  The 2005 Proceedings contains papers and abstracts of research and extension projects on a number of different aspects of conservation tillage.  ...  References ACKNOWLEDGEMENT Funding for this work was provided by the Agriculture Productivity and Profitability Program of the South Carolina Agricultural and Forestry Research System using a special  ... 
doi:10.1109/dac.1984.1585757 fatcat:mr5k3qhzdnhithexe6gnligb2i

Conference Keynote Speaker

1982 19th Design Automation Conference  
It contains reports on animal production, animal waste, pests, fertility and liming, soil water and irrigation, and soil physical and chemical responses to conservation tillage management.  ...  The 2005 Proceedings contains papers and abstracts of research and extension projects on a number of different aspects of conservation tillage.  ...  References ACKNOWLEDGEMENT Funding for this work was provided by the Agriculture Productivity and Profitability Program of the South Carolina Agricultural and Forestry Research System using a special  ... 
doi:10.1109/dac.1982.1585468 fatcat:75qpmsj3lzgwxmra5uiobmhtci

Development of a bone-mounted dynamic physical constraint robot for unicompartmental knee arthroplasty

Masashi Karasawa
2020
During an operation, the robot is mounted to the patient's femur, establishing a robust robot-bone relative position, and the robot imposes accuracy and safety for the surgeon who operates it with both  ...  We also conducted inter-specimen surface comparisons and found an average RMS deviation of 0.07 mm (SD = 0.01 mm) for the combine-curved surface and 0.07 mm (SD = 0.02 mm) for the tri-planar surface.  ...  that is equivalent to the highest lookup table entry. table.  ... 
doi:10.14288/1.0390358 fatcat:s7b4k2zd4jbktoyts6gfkgqi6u

Computational Creativity

Rania A. Hodhod, Brian S. Magerko
2014 International Journal of Cognitive Informatics and Natural Intelligence  
papers and 11 show and tell presentations.  ...  During this period, the symposia and workshops have acted as a focus for an active research community, and have included: The IJWCC series resulted from two previous streams of symposia and workshops associated  ...  Acknowledgements This research was funded by a grant from the Canada Council for the Arts and the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.4018/ijcini.2014040101 fatcat:t75r5mrudzckfm3cjskssgadma

Overview [chapter]

2013 Musical Signal Processing  
tions is to use interpolated table lookups.  ...  An intermediate approach between table lookups and polynomial approxima Practical details ).  ...  As a further distinction, when the grains are emitted by a table-lookup oscil lator we say the grains are synthetic.  ... 
doi:10.4324/9781315078120-11 fatcat:rylq5og6njbqbhe6idh2n7nksy

Physicians' Progress Notes [chapter]

Jørgen Bansler, Erling Havn, Troels Mønsted, Kjeld Schmidt, Jesper Hastrup Svendsen
2013 ECSCW 2013: Proceedings of the 13th European Conference on Computer Supported Cooperative Work, 21-25 September 2013, Paphos, Cyprus  
These are supplemented by exciting workshops and masterclasses that cover a broad range of topics and allow for wider and more active participation.  ...  The papers embrace new theories, and discuss known ones. They challenge the ways we think about and study work and contribute to the discussions of the blurring boundaries between home and work life.  ...  Acknowledgments We thank our collaborators and users in eGov+ and BDSI/CareCoor, Marianne Dammand Iversen and Liam Bannon for comments, CfPH and the AU center PIT.  ... 
doi:10.1007/978-1-4471-5346-7_7 dblp:conf/ecscw/BanslerHMSS13 fatcat:nnouibkakjalzkuugdozzgc5ii
« Previous Showing results 1 — 15 out of 37 results