Results 71 to 80 of about 2,352,999 (340)

Lineage-driven Fault Injection [PDF]

open access: yesProceedings of the 2015 ACM SIGMOD International Conference on Management of Data, 2015
In large-scale data management systems, failure is practically a certainty. Fault-tolerant protocols and components are notoriously difficult to implement and debug. Worse still, choosing existing fault-tolerance mechanisms and integrating them correctly into complex systems remains an art form, and programmers have few tools to assist them. We propose
Peter Alvaro   +2 more
openaire   +1 more source

Structural instability impairs function of the UDP‐xylose synthase 1 Ile181Asn variant associated with short‐stature genetic syndrome in humans

open access: yesFEBS Letters, EarlyView.
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li   +2 more
wiley   +1 more source

Experimental investigation of fault reactivation mechanism and related seismic responses induced by hydraulic fracturing in mining areas

open access: yesMeitan xuebao
Fault reactivation in mining areas can cause significant hazards, including rock bursts and mining-induced seismic events. Water injection and fracturing shows a great potential for fault reactivation regulation and seismicity mitigation.
Wu CAI   +5 more
doaj   +1 more source

Investigation of the Relationship of Earthquakes and Underground Waste Disposal in The El Dorado Area, Arkansas [PDF]

open access: yes, 1991
From December, 1983 to September, 1989 twelve small earthquakes were recorded for the El Dorado, Arkansas area. Magnitudes of these earthquakes were well below damaging levels.
Cox, Randel, VanArsdale, Roy B.
core   +2 more sources

Hardware Fault Injection

open access: yes, 2010
Hardware fault injection is the widely accepted approach to evaluate the behavior of a circuit in the presence of faults. Thus, it plays a key role in the design of robust circuits. This chapter presents a comprehensive review of hardware fault injection techniques, including physical and logical approaches.
Entrena, Luis   +4 more
openaire   +3 more sources

Software Faults Emulation by Software Fault Injection

open access: yesInternational Journal of Computer Applications, 2014
In Computer Science, an emulator is hardware or software or both that duplicates (or emulates) the functions of one computer system (the guest) in another computer system (the host), different from the first one, so that the emulated behavior closely resembles the behavior of the real system (the guest).The computer systems are an affected by software ...
Baiju A S, Soumya S
openaire   +1 more source

Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks

open access: yesWorkshop on Fault Diagnosis and Tolerance in Cryptography, 2020
The isogeny-based scheme CSIDH is a promising candidate for quantum-resistant static-static key exchanges with very small public keys, but is inherently difficult to implement in constant time.
Fabio Campos   +4 more
semanticscholar   +1 more source

Inhibiting stearoyl‐CoA desaturase suppresses bone metastatic prostate cancer by modulating cellular stress, mTOR signaling, and DNA damage response

open access: yesFEBS Letters, EarlyView.
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson   +7 more
wiley   +1 more source

Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem

open access: yes网络与信息安全学报, 2019
As a widely-applied public-key cryptosystem in TLS, SSL and IPSec protocols, the security of RSA cryptosystem is of great importance. At FDTC 2014, Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on ...
KONG Fanyu, LIU Xiaodong, ZHOU Dashui
doaj   +3 more sources

Identify Silent Data Corruption Vulnerable Instructions Using SVM

open access: yesIEEE Access, 2019
Silent data corruption (SDC) is the most insidious and harmful result type of soft error. Identify program vulnerable instructions (PVIns) that are likely to cause SDCs is extremely significant on selective software-based protection techniques.
Na Yang, Yun Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy