Results 21 to 30 of about 17,338 (231)
Unusual glitch activity in the RRAT J1819-1458: an exhausted magnetar? [PDF]
We present an analysis of regular timing observations of the high-magnetic-field Rotating Radio Transient (RRAT) J1819$-$1458 obtained using the 64-m Parkes and 76-m Lovell radio telescopes over the past five years.
A. G. Lyne +37 more
core +3 more sources
New First-Order Secure AES Performance Records
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptographic implementations against Side-Channel Analysis (SCA) attacks.
Aein Rezaei Shahmirzadi +2 more
doaj +1 more source
Dolaysızlık ve Glitch Arasındaki İlişkiye Bir Bakış
Sayısal teknolojiler gündelik yaşamımızı çevrelemiştir. Bu teknolojilerin her ne kadar insan yaşamını kolaylaştırdığı sık sık dile getirilse de aksaklıklar, kusurlar, hatalar daha geniş anlamda teknik bozulmalar sayısal teknolojilerin doğasına ...
Yağız Aydın
doaj +1 more source
Neutron star glitches have a substantial minimum size [PDF]
Glitches are sudden spin-up events that punctuate the steady spin down of pulsars and are thought to be due to the presence of a superfluid component within neutron stars. The precise glitch mechanism and its trigger, however, remain unknown. The size of
Stappers, Benjamin +5 more
core +3 more sources
Pixualization: Glitch art and Data visualization
Due to their trans-modal affordances, techniques mainly used for the production of glitch art such as pixel sorting and data-bending are potential data visualization tools that can be effectively adapted to the representation of abstract relations. To demonstrate this assertion, we present a method intended for the visualization of data through these ...
Ernesto Peña +2 more
openaire +2 more sources
Progress report on solar age calibration [PDF]
We report on an ongoing investigation into a seismic calibration of solar models designed for estimating the main-sequence age and a measure of the chemical abundances of the Sun.
Asplund +8 more
core +1 more source
On the one hand, the sphere of art offers the possibility to imagine a different, less oppressive and normative world, where just as in the case of cartoons even the greatest gawks, misfits, and outcasts would build friendships and alliances helping ...
Xawery Stańczyk
doaj +1 more source
Low-Latency and Low-Randomness Second-Order Masked Cubic Functions
Masking schemes are the most popular countermeasure to mitigate Side-Channel Analysis (SCA) attacks. Compared to software, their hardware implementations require certain considerations with respect to physical defaults, such as glitches. To counter this
Aein Rezaei Shahmirzadi +2 more
doaj +1 more source
Glitch in Contemporary Video Art (Iranian Glitch Artists)
Abstract Glitch art is the use of digital or analog errors for cosmetic purposes by corrupting digital data or physical manipulation of electronic devices. What's called "glitch art" usually means visual bugs, whether in a still or moving image. It is difficult to classify and recognize a glitch. Primarily from a theoretical, scientific and non-
openaire +1 more source
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking
Intellectual Property (IP) thefts of trained machine learning (ML) models through side-channel attacks on inference engines are becoming a major threat. Indeed, several recent works have shown reverse engineering of the model internals using such attacks,
Anuj Dubey +4 more
doaj +1 more source

