Results 91 to 100 of about 6,293,788 (277)

MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction [PDF]

open access: yesarXiv, 2021
Logic locking has received considerable interest as a prominent technique for protecting the design intellectual property from untrusted entities, especially the foundry. Recently, machine learning (ML)-based attacks have questioned the security guarantees of logic locking, and have demonstrated considerable success in deciphering the secret key ...
arxiv  

Health Care Coverage: Job Lock and the Potential Impact of the Patient Protection and Affordable Care Act [PDF]

open access: yes, 2011
[Excerpt] The majority of Americans—about 55 percent in 2010—rely on employer-sponsored health care coverage, which is largely subsidized by most employers and thus less costly to employees than coverage purchased by individuals on their own.
United States Government Accountability Office
core   +2 more sources

Assembling oppositely charged lock and key responsive colloids: A mesoscale analog of adaptive chemistry

open access: yesScience Advances, 2017
Oppositely charged thermoresponsive particles with complementary geometries are assembled into adaptive colloidal molecules. We have seen a considerable effort in colloid sciences to copy Nature’s successful strategies to fabricate complex functional ...
A. Mihut   +4 more
semanticscholar   +1 more source

Adaptive Lock-Free Data Structures in Haskell: A General Method for Concurrent Implementation Swapping

open access: yes, 2017
A key part of implementing high-level languages is providing built-in and default data structures. Yet selecting good defaults is hard. A mutable data structure's workload is not known in advance, and it may shift over its lifetime - e.g., between read ...
Chen, Chao-Hong   +2 more
core   +1 more source

SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL

open access: yesCommIT Journal, 2008
Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time.
Indri Neforawati, Hoga Saragih
doaj   +1 more source

Evolving the lock to fit the key to create a family of G protein-coupled receptors potently activated by an inert ligand

open access: yesProceedings of the National Academy of Sciences of the United States of America, 2007
We evolved muscarinic receptors in yeast to generate a family of G protein-coupled receptors (GPCRs) that are activated solely by a pharmacologically inert drug-like and bioavailable compound (clozapine-N-oxide).
Blaine N. Armbruster   +4 more
semanticscholar   +1 more source

Locks and keys: How fast can you open several locks with too many keys? [PDF]

open access: yesarXiv, 2015
This short note is the result of a French "Hippocampe internship" that aims at introducing the world of research to young undergraduate French students. The problem studied is the following: imagine yourself locked in a cage barred with $n$ different locks. You are given a keyring with $N \geq n$ keys containing the $n$ keys that open the locks.
arxiv  

Lock-and-key PORE-igami [PDF]

open access: yesNature Methods, 2016
A nanopore built from DNA allows the controlled and selective transport of organic molecules across a lipid membrane.
openaire   +3 more sources

Heterogeneous and rate-dependent streptavidin-biotin unbinding revealed by high-speed force spectroscopy and atomistic simulations [PDF]

open access: yes, 2019
Receptor-ligand interactions are essential for biological function and their binding strength is commonly explained in terms of static lock-and-key models based on molecular complementarity.
Gonzalez, Laura   +4 more
core   +3 more sources

Supporting energy technology deployment while avoiding unintended technological lock-in: a policy design perspective

open access: yesEnvironmental Research Letters, 2018
Technology deployment policies can play a key role in bringing early-stage energy technologies to the market and reducing their cost along their learning curves.
Leonore Haelg   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy