Results 91 to 100 of about 36,844 (310)

L'error en els aparells com a possibilitat estètica

open access: yesArtnodes, 2012
L'error sembla que és el que s'interposa entre l'ésser ideal i el real. Un esdeveniment, un No-ésser que transforma i deforma l'Ésser. En les tècniques, tecnologies, suports i mitjans audiovisuals es mira de suprimir; tanmateix, hi ha una possibilitat ...
Alejandro Schianchi
doaj   +1 more source

Smart Card Fault Injections with High Temperatures [PDF]

open access: yes, 2016
Power and clock glitch attacks on smart cards can help an attacker to discover some internal secrets or bypass certain security checks. Also, an attacker can manipulate the temperature and supply voltage of the device, thus making the device glitch ...
Batina, Lejla   +2 more
core  

The glitch-induced identity changes of PSR J1119-6127

open access: yes, 2010
We demonstrate that the high-magnetic field pulsar J1119-6127 exhibits three different types of behaviour in the radio band. Trailing the "normal" profile peak there is an "intermittent" peak and these components are flanked by two additional components ...
Abdo   +93 more
core   +1 more source

Synthesis and Evaluation of the First Generation of Glycosylated Nucleoside Analogues as Potential Inhibitors of the Base J Metabolism in Kinetoplastid Parasites

open access: yesChemistry – A European Journal, EarlyView.
Novel analogues of the kinetoplastid‐specific DNA base J unlock a new way to target parasite epigenetic regulation. Some compounds selectively inhibit Leishmania and Trypanosoma species without harming human cells, revealing a promising route toward innovative antiparasitic therapies.
Océane Monfret   +9 more
wiley   +1 more source

Legal governance countermeasures for social problems based on the clustering algorithm under the application of big data technology

open access: yesIET Networks, EarlyView., 2022
This work aims to improve the comprehensive role of big data technology in promoting social development and reduce the continuous emergence of social problems under the background of big data application. Abstract The purpose is to improve the security of the application of big data technology and ensure the stable development of society in the context
Xuejie Zhao
wiley   +1 more source

L'autoreferencialitat en l'art. El metallenguatge en el mitjà digital

open access: yesArtnodes, 2007
Aquest article analitza les obres d'alguns artistes digitals que utilitzen els recursos propis del mitjà digital com a missatge central. La nostra intenció serà exposar les múltiples formes d'utilitzar, desenvolupar i manipular el metallenguatge ...
Eloi Puig
doaj   +1 more source

Identification of noise artifacts in searches for long-duration gravitational-wave transients

open access: yes, 2012
We present an algorithm for the identification of transient noise artifacts (glitches) in cross-correlation searches for long O(10s) gravitational-wave transients.
Christensen, Nelson L.   +7 more
core   +1 more source

A Novel Active Rectifier With Embedded Current Monitoring Capabilities for Wireless Power Transfer Systems

open access: yesInternational Journal of Circuit Theory and Applications, EarlyView.
Proposed active rectifier solution, detailing the high‐side and low‐side power switch control circuit for implementing the active diodes. ABSTRACT This paper proposes a novel active rectifier architecture for wireless power transfer (WPT) systems. In addition to performing rectification, the proposed structure features embedded current monitoring ...
Elisabetta Moisello   +3 more
wiley   +1 more source

'Anti-blackness is no glitch' [PDF]

open access: bronze, 2020
Stephanie Tubbs Jones   +1 more
openalex   +1 more source

Home - About - Disclaimer - Privacy