Results 81 to 90 of about 593,784 (199)

Preferences for Firearm Locking Devices and Device Features Among Participants in a Firearm Safety Event

open access: yesWestern Journal of Emergency Medicine, 2019
Introduction: Safe firearm storage is associated with a lower risk of firearm-related injury and death. Although providing firearm locking devices is a key component of firearm safety interventions, little is known about the types and characteristics of ...
Joseph A. Simonetti   +5 more
doaj   +1 more source

Supernovae from rotating stars

open access: yes, 2017
The present paper discusses the main physical effects produced by stellar rotation on presupernovae, as well as observations which confirm these effects and their consequences for presupernova models.
A Gal-Yam   +52 more
core   +1 more source

Voters hold the key: lock-in, mobility, and the portability of property tax exemptions [PDF]

open access: yes
Since California voters approved Proposition 13 in 1978, fifteen states have enacted caps on the annual growth in assessed property values. These laws often impose a great burden on municipal finances and create horizontal inequity among homeowners.
Chris Cunningham, Ron Cheung
core  

Bridging the Gap Between Energy and Climate Policies in Brazil: Policy Options to Reduce Energy-Related GHG Emissions [PDF]

open access: yes, 2015
Brazil is facing a series of important policy decisions that will determine its energy future over the next several decades, with important implications for the country's economic competitiveness, the well-being of its citizens, and the global climate ...
Oswaldo Lucon   +2 more
core  

Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices

open access: yesJournal of Internet Services and Information Security, 2017
This paper presents a practical design of backdoor to permanently bypass the screen lock mechanisms on Android devices. Our design has many advantages such as difficulty in detecting backdoor, fast execution time and low power consumption.
Junsung Cho   +3 more
doaj   +1 more source

Enhancing a Lock-and-Key Scheme With MTE to Mitigate Use-After-Frees

open access: yesIEEE Access
Preventing Use-After-Free (UAF) bugs is crucial to ensure temporal memory safety. Against UAF attacks, much research has adopted a well-known approach, lock-and-key, in which unique, disposable locks and keys are first assigned respectively to objects ...
Inyoung Bang   +5 more
doaj   +1 more source

Lock and Key

open access: yes, 2020
This music score was submitted for the Kaleidoscope 2020 Call for Scores, an open access collaboration with the UCLA Music Library.
openaire   +1 more source

An Adaptive Multi-Layer Anti-Lock Braking Control Method Based on Fuzzy Logic

open access: yesIEEE Access
The Anti-lock Braking System (ABS) is a key component in automotive safety, with its controller playing a pivotal role in braking effectiveness. Current ABS technology has excellent performance under normal road conditions, but faces the challenge of ...
Yajing Kang   +4 more
doaj   +1 more source

Replacement-Based Key-Controlled Circuits: A New Lightweight Logic-Locking Technique to Prevent the SAT Attack and Its Variants

open access: yesApplied Sciences
The current trend of globalization of the supply chain in the integrated circuit (IC) industry has led to numerous security issues, such as intellectual property (IP) piracy, overbuilding, hardware Trojan (HT), and so on.
Weizheng Wang, Luoyi Zhao, Shuo Cai
doaj   +1 more source

Is the kernel-staples match a key-lock match? [PDF]

open access: yesChem Sci, 2018
Zhuang S   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy