Results 21 to 30 of about 17,338 (231)

Unusual glitch activity in the RRAT J1819-1458: an exhausted magnetar? [PDF]

open access: yes, 2009
We present an analysis of regular timing observations of the high-magnetic-field Rotating Radio Transient (RRAT) J1819$-$1458 obtained using the 64-m Parkes and 76-m Lovell radio telescopes over the past five years.
A. G. Lyne   +37 more
core   +3 more sources

New First-Order Secure AES Performance Records

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptographic implementations against Side-Channel Analysis (SCA) attacks.
Aein Rezaei Shahmirzadi   +2 more
doaj   +1 more source

Dolaysızlık ve Glitch Arasındaki İlişkiye Bir Bakış

open access: yesErciyes İletişim Dergisi, 2019
Sayısal teknolojiler gündelik yaşamımızı çevrelemiştir. Bu teknolojilerin her ne kadar insan yaşamını kolaylaştırdığı sık sık dile getirilse de aksaklıklar, kusurlar, hatalar daha geniş anlamda teknik bozulmalar sayısal teknolojilerin doğasına ...
Yağız Aydın
doaj   +1 more source

Neutron star glitches have a substantial minimum size [PDF]

open access: yes, 2014
Glitches are sudden spin-up events that punctuate the steady spin down of pulsars and are thought to be due to the presence of a superfluid component within neutron stars. The precise glitch mechanism and its trigger, however, remain unknown. The size of
Stappers, Benjamin   +5 more
core   +3 more sources

Pixualization: Glitch art and Data visualization

open access: yesInfoDesign - Revista Brasileira de Design da Informação, 2017
Due to their trans-modal affordances, techniques mainly used for the production of glitch art such as pixel sorting and data-bending are potential data visualization tools that can be effectively adapted to the representation of abstract relations. To demonstrate this assertion, we present a method intended for the visualization of data through these ...
Ernesto Peña   +2 more
openaire   +2 more sources

Progress report on solar age calibration [PDF]

open access: yes, 2008
We report on an ongoing investigation into a seismic calibration of solar models designed for estimating the main-sequence age and a measure of the chemical abundances of the Sun.
Asplund   +8 more
core   +1 more source

Images of Failure

open access: yesStudia Litteraria et Historica, 2020
On the one hand, the sphere of art offers the possibility to imagine a different, less oppressive and normative world, where just as in the case of cartoons even the greatest gawks, misfits, and outcasts would build friendships and alliances helping ...
Xawery Stańczyk
doaj   +1 more source

Low-Latency and Low-Randomness Second-Order Masked Cubic Functions

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Masking schemes are the most popular countermeasure to mitigate Side-Channel Analysis (SCA) attacks. Compared to software, their hardware implementations require certain considerations with respect to physical defaults, such as glitches. To counter this
Aein Rezaei Shahmirzadi   +2 more
doaj   +1 more source

Glitch in Contemporary Video Art (Iranian Glitch Artists)

open access: yes, 2021
Abstract Glitch art is the use of digital or analog errors for cosmetic purposes by corrupting digital data or physical manipulation of electronic devices. What's called "glitch art" usually means visual bugs, whether in a still or moving image. It is difficult to classify and recognize a glitch. Primarily from a theoretical, scientific and non-
openaire   +1 more source

ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Intellectual Property (IP) thefts of trained machine learning (ML) models through side-channel attacks on inference engines are becoming a major threat. Indeed, several recent works have shown reverse engineering of the model internals using such attacks,
Anuj Dubey   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy