Results 41 to 50 of about 9,050,905 (317)

Function-call Instruction Characteristic Analysis Based Instruction Set Architecture Recognization Method for Firmwares [PDF]

open access: yesJisuanji kexue
The recognition of instruction set architecture is a crucial task for conducting security research on embedded devices,and has significant implications.However,existing studies and tools often suffer from low recognition accuracy and high false positive ...
JIA Fan, YIN Xiaokang, GAI Xianzhe, CAI Ruijie, LIU Shengli
doaj   +1 more source

A complete formal semantics of x86-64 user-level instruction set architecture

open access: yesACM-SIGPLAN Symposium on Programming Language Design and Implementation, 2019
We present the most complete and thoroughly tested formal semantics of x86-64 to date. Our semantics faithfully formalizes all the non-deprecated, sequential user-level instructions of the x86-64 Haswell instruction set architecture.
Sandeep Dasgupta   +4 more
semanticscholar   +1 more source

Instruction Set Architectures for Quantum Processing Units

open access: yes, 2017
Progress in quantum computing hardware raises questions about how these devices can be controlled, programmed, and integrated with existing computational workflows.
AR Calderbank   +3 more
core   +1 more source

The Effects of Combined Verbal Encouragement and Technical Instruction on Technical Skills and Psychophysiological Responses During Small-Sided Handball Games Exercise in Physical Education

open access: yesFrontiers in Psychology, 2022
To examine the effects of combined positive verbal encouragement and general technical guidelines on technical and psychophysiological parameters in pupils during a small-sided handball passing game.
Feten Sahli   +8 more
doaj   +1 more source

Formal verification of a software countermeasure against instruction skip attacks [PDF]

open access: yes, 2013
Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the attacker can perform.
Encrenaz, Emmanuelle   +3 more
core   +7 more sources

Applying Theories in Language Programs [PDF]

open access: yes, 2017
Selected Topics in Applied Linguistics: How to Choose a Theory. I offer a critical exploration of some of the conditions involved in Instructed Second Language Acquisition (ISLA), as well as of the paradoxical approaches in the theoretical questions ...
Mary Wildner-Bassett
core   +1 more source

Evaluating the Utility of Paired Tumor and Germline Targeted DNA Sequencing for Pediatric Oncology Patients: A Single Institution Report

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski   +9 more
wiley   +1 more source

Optimizing the SICStus Prolog virtual machine instruction set [PDF]

open access: yes, 2001
The Swedish Institute of Computer Science (SICS) is the vendor of SICStus Prolog. To decrease execution time and reduce space requirements, variants of SICStus Prolog's virtual instruction set were investigated.
Nässén, Henrik
core   +2 more sources

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Compiler Optimization of Wide Memory Access for Aarch64

open access: yesСовременные информационные технологии и IT-образование
The popularity of ARM-based processors in HPC and cloud computing is gradually increasing and the development of compilers and code optimizations is important to achieve better use of hardware resources.
Viacheslav Chernonog   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy