Dynamic response of viscous compressible fluids in rigid tubes [PDF]
Data on experimental verification of Iberall's analysis applies to such problems as pressure sensing, pneumatic control circuits with bellows, measuring irregular shaped volumes, and transmitting fluid power by pulsating ...
Goldschmied, F. R.
core +1 more source
High-resolution traffic flow data from the urban traffic control system in Glasgow
Traffic flow data has been used in various disciplines, including geography, transportation, urban planning, and public health. However, existing datasets often have limitations such as low spatiotemporal resolution and inconsistent quality due to data ...
Yue Li, Qunshan Zhao, Mingshu Wang
doaj +1 more source
A 5G-enabled scheme for differential protection of distribution lines considering data flow control
To address the issue of large data flow of 5G channel for differential protection of distribution lines, a 5G-based scheme for differential protection for distribution lines considering data flow control is proposed.
XUE Mingjun +5 more
doaj +1 more source
C-FLAT: Control-FLow ATtestation for Embedded Systems Software
Remote attestation is a crucial security service particularly relevant to increasingly popular IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a remote, and potentially malware-infected, device (prover).
Abera, Tigist +7 more
core
General purpose simulation system of the data management system for Space Shuttle mission 18 [PDF]
A simulation program for the flow of data through the Data Management System of Spacelab and Space Shuttle was presented. The science, engineering, command and guidance, navigation and control data were included. The programming language used was General
Bengtson, N. M. +2 more
core +1 more source
New Benchmarking Methodology and Programming Model for Big Data Processing
Big data processing is becoming a reality in numerous real-world applications. With the emergence of new data intensive technologies and increasing amounts of data, new computing concepts are needed.
Anton Kos +5 more
doaj +1 more source
Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization
Intel Software Guard Extensions (SGX) is a promising hardware-based technology for protecting sensitive computations from potentially compromised system software.
Brasser F. +4 more
core +1 more source
Optimized Data-Flow Integrity for Modern Compilers
Non-control-data attacks are those attacks that purely target and modify the non-control data of a program, such as boolean values, user input or configuration parameters, and leave the control flow of a program untouched. These attacks were considered a
Irene Diez-Franco +2 more
doaj +1 more source
Enabling Operator Reordering in Data Flow Programs Through Static Code Analysis [PDF]
In many massively parallel data management platforms, programs are represented as small imperative pieces of code connected in a data flow. This popular abstraction makes it hard to apply algebraic reordering techniques employed by relational DBMSs and ...
Hueske, Fabian +2 more
core
CamFlow: Managed Data-sharing for Cloud Services
A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications.
Bacon, Jean +3 more
core +2 more sources

