Results 101 to 110 of about 521,610 (289)
LLM for SoC Security: A Paradigm Shift
As the ubiquity and complexity of system-on-chip (SoC) designs increase across electronic devices, incorporating security into an SoC design flow poses significant challenges.
Dipayan Saha +6 more
doaj +1 more source
The Management and Security Expert (MASE) [PDF]
The Management and Security Expert (MASE) is a distributed expert system that monitors the operating systems and applications of a network. It is capable of gleaning the information provided by the different operating systems in order to optimize ...
Barr, Stanley J. +5 more
core +1 more source
Asymmetry in Skipping Enhances Viability Against Control Input Noise
Quadruped animals use asymmetric galloping gaits at high speeds, yet the functional role of this asymmetry remains unclear. This study shows that left–right asymmetry in touchdown angles enhances robustness to control noise. Using a simple two‐legged locomotion model and viability theory, it demonstrates that asymmetric skipping substantially enlarges ...
Yuichi Ambe, Alvin So, Shinya Aoi
wiley +1 more source
Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches
Security verification of masked software implementations of cryptographic algorithms must account for microarchitectural side-effects of CPUs. Leakage contracts were proposed to provide a formal separation between hardware and software verification ...
Johannes Haring +2 more
doaj +1 more source
Permanent magnet putty (PMP) integrates high‐coercivity NdFeB particles with a dynamic polyborosiloxane–Ecoflex matrix, achieving rapid self‐healing (90% mechanical recovery in 10 s) and magnetic recovery within 20 min. With twice the sensitivity of commercial putties, PMP enables precise 5–30 N force detection and discrimination between pressing and ...
Ruotong Zhao +5 more
wiley +1 more source
Automated poultry processing lines still rely on humans to lift slippery, easily bruised carcasses onto a shackle conveyor. Deformability, anatomical variance, and hygiene rules make conventional suction and scripted motions unreliable. We present ChicGrasp, an end‐to‐end hardware‐software co‐designed imitation learning framework, to offer a ...
Amirreza Davar +8 more
wiley +1 more source
Hardware Security of Fog End-Devices for the Internet of Things. [PDF]
Butun I, Sari A, Österberg P.
europepmc +1 more source
Compliant Pneumatic Feet with Real‐Time Stiffness Adaptation for Humanoid Locomotion
A compliant pneumatic foot with real‐time variable stiffness enables humanoid robots to adapt to changing terrains. Using onboard vision and pressure control, the foot modulates stiffness within each gait cycle, reducing impact forces and improving balance. The design, cast in soft silicone with embedded air chambers and Kevlar wrapping, offers durable,
Irene Frizza +3 more
wiley +1 more source
Random-telegraph-noise-enabled true random number generator for hardware security. [PDF]
Brown J +6 more
europepmc +1 more source
Here, we present a textile, wearable capacitive interface enabling multidirectional remote control by dynamically modulating electrode overlap and spacing via a freely gliding upper electrode. A forearm‐mounted prototype drives robotic and media tasks with 12–15 ms latency, maintains < 0.8% drift after 500 cycles, and remains stably functional at 90 ...
Cagatay Gumus +8 more
wiley +1 more source

