Results 81 to 90 of about 134,754 (281)
Abstract Ecological restoration projects with diverse interest groups face the continual challenge of engaging values, goals and cultures that may vary greatly among partners. As part of an eco‐cultural, riparian restoration project led by the Northwestern Band of the Shoshone Nation, our research examines the instrumental, relational and intrinsic ...
Sarah Woodbury +3 more
wiley +1 more source
Optimal Hierarchical Layouts for Cache-Oblivious Search Trees
This paper proposes a general framework for generating cache-oblivious layouts for binary search trees. A cache-oblivious layout attempts to minimize cache misses on any hierarchical memory, independent of the number of memory levels and attributes at ...
Lindstrom, Peter, Rajan, Deepak
core +1 more source
ABSTRACT Planetary exploration is rapidly gaining importance within the space research community. Autonomous locomotion of rovers requires consideration of several mobility aspects to ensure safety, including avoiding hazardous areas that can cause the robot to become immobilized in soft soil or damaged in sharp terrains.
Alessio De Luca +3 more
wiley +1 more source
Information-Centric Networking (ICN) typically utilizes DRAM (Dynamic Random Access Memory) to build in-network cache components due to its high data transfer rate and low latency. However, DRAM faces significant limitations in terms of cost and capacity,
Yichao Chao, Rui Han
doaj +1 more source
Micro‐transitions and work identity: The case of academic entrepreneurs
Abstract Research Summary This paper examines how academic entrepreneurs—scientists who found research‐based startups while remaining in academia—construct and sustain their professional identities amid frequent transitions between academic and entrepreneurial roles.
Marouane Bousfiha, Henrik Berglund
wiley +1 more source
A Simple Cache Emulator for Evaluating Cache Behavior for SMP Systems
Every modern CPU uses a complex memory hierarchy, which consists of multiple cache memory levels. It is very difficult to predict the behavior of this hierarchy for a given program (for details see [1, 2]).
I. Šimeček
doaj
Defending Against Flush+Reload Attack With DRAM Cache by Bypassing Shared SRAM Cache
Cache side-channel attack is one of the critical security threats to modern computing systems. As a representative cache side-channel attack, Flush+Reload attack allows an attacker to steal confidential information (e.g., private encryption key) by ...
Minwoo Jang +3 more
doaj +1 more source
Predation by pine martens Martes martes and red foxes Vulpes vulpes is an important factor influencing the population dynamics of capercaillie Tetrao urogallus. However, there is a knowledge gap regarding the relative effects of these mesopredators on the reproductive success of capercaillie. To better understand how various landscape factors influence
Siow Yan Jennifer Angoh +4 more
wiley +1 more source
To cope with highly stochastic and/or heterogeneous environmental conditions, animals must balance energy resource allocation across physiological processes. The digestive tract and brain exhibit structural variations under strong developmental and selective pressures that vary across environmental gradients both between and within species.
Yimei Yan +9 more
wiley +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source

