Results 71 to 80 of about 2,352,999 (340)
Lineage-driven Fault Injection [PDF]
In large-scale data management systems, failure is practically a certainty. Fault-tolerant protocols and components are notoriously difficult to implement and debug. Worse still, choosing existing fault-tolerance mechanisms and integrating them correctly into complex systems remains an art form, and programmers have few tools to assist them. We propose
Peter Alvaro +2 more
openaire +1 more source
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li +2 more
wiley +1 more source
Fault reactivation in mining areas can cause significant hazards, including rock bursts and mining-induced seismic events. Water injection and fracturing shows a great potential for fault reactivation regulation and seismicity mitigation.
Wu CAI +5 more
doaj +1 more source
Investigation of the Relationship of Earthquakes and Underground Waste Disposal in The El Dorado Area, Arkansas [PDF]
From December, 1983 to September, 1989 twelve small earthquakes were recorded for the El Dorado, Arkansas area. Magnitudes of these earthquakes were well below damaging levels.
Cox, Randel, VanArsdale, Roy B.
core +2 more sources
Hardware fault injection is the widely accepted approach to evaluate the behavior of a circuit in the presence of faults. Thus, it plays a key role in the design of robust circuits. This chapter presents a comprehensive review of hardware fault injection techniques, including physical and logical approaches.
Entrena, Luis +4 more
openaire +3 more sources
Software Faults Emulation by Software Fault Injection
In Computer Science, an emulator is hardware or software or both that duplicates (or emulates) the functions of one computer system (the guest) in another computer system (the host), different from the first one, so that the emulated behavior closely resembles the behavior of the real system (the guest).The computer systems are an affected by software ...
Baiju A S, Soumya S
openaire +1 more source
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks
The isogeny-based scheme CSIDH is a promising candidate for quantum-resistant static-static key exchanges with very small public keys, but is inherently difficult to implement in constant time.
Fabio Campos +4 more
semanticscholar +1 more source
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson +7 more
wiley +1 more source
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
As a widely-applied public-key cryptosystem in TLS, SSL and IPSec protocols, the security of RSA cryptosystem is of great importance. At FDTC 2014, Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on ...
KONG Fanyu, LIU Xiaodong, ZHOU Dashui
doaj +3 more sources
Identify Silent Data Corruption Vulnerable Instructions Using SVM
Silent data corruption (SDC) is the most insidious and harmful result type of soft error. Identify program vulnerable instructions (PVIns) that are likely to cause SDCs is extremely significant on selective software-based protection techniques.
Na Yang, Yun Wang
doaj +1 more source

