Results 11 to 20 of about 942,194 (293)
Offline programming (OLP) is a mainstream approach for controlling assembly robots at construction sites. However, existing methods are tailored to specific assembly tasks and workflows, and thus lack flexibility.
Hanbin Luo +3 more
doaj +3 more sources
A Histone Code for Chromatin Assembly [PDF]
In this issue, two papers implicate histone H3 lysine 56 acetylation in histone deposition in chromatin. Li et al. (2008) show that acetylation of H3K56 promotes S phase chromatin assembly that is mediated by the histone chaperones CAF-1 and Rtt106. Chen et al.
Fillingham, Jeffrey, Greenblatt, Jack F.
openaire +2 more sources
The paper describes the phenomenology of fuel rod behaviour in severe accident. As an example, an experiment is described resulting in severe damage of 19 fuel rod assembly of VVER type; it was carried out in the CORA facility in 1993 (Research Centre ...
Stepan Lys
doaj +1 more source
Validation of PWR Neutronics Code Package TORCH V2.0 With Nuclear Power Plant Measurements
This article presents the verification and validation (V and V) of PWR neutronics code package TORCH V2.0 with nuclear power plant (NPP) measurements. The advanced nuclear power engineering design software, TORCH V2.0, was developed by the Nuclear Power ...
Bin Zhang +4 more
doaj +1 more source
Binary Code Similarity Detection Method Based on Pre-training Assembly Instruction Representation [PDF]
Binary code similarity detection has been widely used in vulnerability searching,malware detection,advanced program analysis and other fields in recent years,while program code is similar to natural language in a degree,researchers start to use pre ...
WANG Taiyan, PAN Zulie, YU Lu, SONG Jingbin
doaj +1 more source
Self-assembly of DNA-coded nanoclusters [PDF]
v2, 4 pages, 7 figures, added journal ...
Licata, Nicholas A. +1 more
openaire +3 more sources
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code
Over the past decades, fault injection attacks have been extensively studied due to their capability to efficiently break cryptographic implementations.
Jakub Breier, Xiaolu Hou, Yang Liu
doaj +1 more source
Link-time smart card code hardening [PDF]
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is ...
De Bosschere, Koen +3 more
core +1 more source
The rapid occurrence of therapy-resistant mutant strains provides a challenge for anti-viral therapy. An ideal drug target would be a highly conserved molecular feature in the viral life cycle, such as the packaging signals in the genomes of RNA viruses ...
Richard J. Bingham +2 more
doaj +1 more source
A secure operating system in the communication network can provide the stable working environment, which ensures that the user information is not stolen.
Zhenjiang Qian +4 more
doaj +1 more source

