Results 81 to 90 of about 6,293,789 (277)

Uncovering noisy social signals: Using optimization methods from experimental physics to study social phenomena. [PDF]

open access: yesPLoS ONE, 2017
Due to the ubiquitous presence of treatment heterogeneity, measurement error, and contextual confounders, numerous social phenomena are hard to study. Precise control of treatment variables and possible confounders is often key to the success of studies ...
Maurits Kaptein   +2 more
doaj   +1 more source

Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators [PDF]

open access: yesarXiv, 2023
Logic locking has been proposed to safeguard intellectual property (IP) during chip fabrication. Logic locking techniques protect hardware IP by making a subset of combinational modules in a design dependent on a secret key that is withheld from untrusted parties.
arxiv  

Portable appliance security apparatus [PDF]

open access: yes, 1981
An apparatus for securing a small computer, or other portable appliance, against theft is described. It is comprised of a case having an open back through which the computer is installed or removed. Guide members in the form of slots are formed in a rear
Kerley, J. J.
core   +1 more source

HOLL: Program Synthesis for Higher OrderLogic Locking [PDF]

open access: yesarXiv, 2022
Logic locking "hides" the functionality of a digital circuit to protect it from counterfeiting, piracy, and malicious design modifications. The original design is transformed into a "locked" design such that the circuit reveals its correct functionality only when it is "unlocked" with a secret sequence of bits--the key bit-string.
arxiv  

Opening up public data should be an urgent priority for the government and could lead to considerable economic benefits [PDF]

open access: yes, 2012
There is no longer a reasonable justification for keeping publicly funded data under lock and key. With the government ostensibly committed to transparency, Chris Yiu argues that opening up public data is a must, and could have solid economic and ...
Yiu, Chris
core  

From Lock Freedom to Progress Using Session Types [PDF]

open access: yes, 2013
Inspired by Kobayashi's type system for lock freedom, we define a behavioral type system for ensuring progress in a language of binary sessions. The key idea is to annotate actions in session types with priorities representing the urgency with which such
Padovani, Luca
core   +3 more sources

Solvent fluctuations induce non-Markovian kinetics in hydrophobic pocket-ligand binding

open access: yes, 2016
We investigate the impact of water fluctuations on the key-lock association kinetics of a hydrophobic ligand (key) binding to a hydrophobic pocket (lock) by means of a minimalistic stochastic model system.
Dzubiella, Joachim   +2 more
core   +1 more source

Experimentally realizable quantum comparison of coherent states and its applications [PDF]

open access: yes, 2006
When comparing quantum states to each other, it is possible to obtain an unambiguous answer, indicating that the states are definitely different, already after a single measurement. In this paper we investigate comparison of coherent states, which is the
B. Schneier   +11 more
core   +2 more sources

Exploiting the Lock: Leveraging MiG-V's Logic Locking for Secret-Data Extraction [PDF]

open access: yes
The MiG-V was designed for high-security applications and is the first commercially available logic-locked RISC-V processor on the market. In this context logic locking was used to protect the RISC-V processor design during the untrusted manufacturing process by using key-driven logic gates to obfuscate the original design. Although this method defends
arxiv   +1 more source

ISGylation – a key to lock the cell gates for preventing the spread of threats

open access: yesJournal of Cell Science, 2017
Interferon stimulated gene 15 (ISG15) is an ubiquitin-like protein whose expression and conjugation to targets (ISGylation) is induced by infection, interferon (IFN)-α and -β, ischemia, DNA damage and aging.
Carolina Villarroya-Beltri   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy